this Reference http://dl.acm.org.ezproxy.csu.edu.au/citation.

Literature Review (Secondary Research)Template Student Name Project Topic Title Security in Contents Distribution Networks, CDN. 1 Reference in APA format URL of the Reference Authors Names and Emails Keywords in this Reference http://dl.acm.org.ezproxy.csu.edu.au/citation.cfm?doid=1842733.1842736 Erik Nygren – {nygren, ramesh}@akamai.com, Ramesh K. Sitaraman – [email protected] Jennifer Sun – [email protected] High-Performance Internet Applications CDN The Name of the Current Solution (Technique/ Method/ Scheme/ Algorithm/ Model/ Tool/ Framework/ … etc ) The Goal (Objective) of this Solution& What is the problem that need to be solved What are the components of it? The research evaluates Akamai platform as a CDN performance enhancer by evaluating its use in seventy countries. The article reviews the use of the technology to review the capabilities of the systems to improve performance and increase reliability of internet applications. The company pioneered the idea of CDN as a tool to enable businesses handle technical issues. The paper seeks to prove that a highly distributed network is the ideal model for businesses to overcome internet limitation in performance and security. The paper focuses on the internet as a platform that gives an end-to-end connection. The failure of the system has a high impact on businesses in terms of losses and thus in boosting productivity of the networks, businesses can be saved from losses. The Process (Mechanism) of this Work; Means How the Problem has Solved& Advantage & Disadvantage of Each Step in This Process In studying the literature review, the team leant that 40% of web shopper’s value performance of the site to enable them return.The team carried out a review on the study by Akamai on e-commerce platforms. The groups were separated in half, with the first team using Akamai platform and the other half accessing the sites directly. The findings of the study showed that 15% using Akamai bought products and 9% are likely to leave the site compared to 91% of the other customers. Some of the common problems identified from the study were unreliable networks that are prone to hijacking such as the black out of YouTube in Pakistan in 2008. Other issues identified are slow adoption of technology, ineffective communication protocols, peer point congestion and unfavourable routing protocols. Process Steps Advantage Disadvantage (Limitation) 1 Literature review on other studies It saves on time and identifies gaps in the study The information credibility is based on the author’s honesty. Research could also be outdated. 2 Assess Akamai’s studies to develop their paper Saves on costs and time and Reliable data. The information focus could be biased by the company based on the variables tested. 3 4 5 Major Impact Factors in this Work Dependent Variable Independent Variable Performance Internet reliability Security Relationship Among The Above 4 Variables in This article The functionality of the internet is influenced by the performance, security and Input and Output Feature of This Solution Contribution in This Work Input Output Original Source End user (Customer) The model helps to reduce security threat and improve performance in the CDN networks. It has improved the development of security standards for businesses. Analyse This Work By Critical Thinking The Tools That Assessed this Work The paper evaluated the design of Akamai in boosting the internet performance and improving CDN systems. The evaluation focused on data from the origin and through the channels that it reaches the end user being secure and safe. The model limits human management and increased performance, scalability and reliability. The model focused also on the key actors, the original data publishers, the customer, and the systems role in the flow and distribution of information via the internet. In evaluating the role of Akamai in dealing with security threat, the research revealed that its systems embrace high-level security protocols. Some of the esteemed clients to the system include My space, Sophos and MTV. These clients have high traffic and are vulnerable to traffic and threats, thus the system has been able to regulate some of the threats yet some it has had challenges in handling. Customer evaluation Speed tests Diagram/Flowchart The chat below describes the Network system of Akamai: 2 Reference in APA format URL of the Reference Authors Names and Emails Keywords in this Reference http://www.cs.ucr.edu/~ravi/Papers/NWConf/clickfraud.pdf Saugat Majumdar – [email protected] Dhananjay Kulkarni – [email protected] Chinya V. Ravishankar – [email protected] Click Fraud, Content Delivery Systems The Name of the Current Solution (Technique/ Method/ Scheme/ Algorithm/ Model/ Tool/ Framework/ … etc ) The Goal (Objective) of this Solution& What is the problem that need to be solved What are the components of it? The research focuses on the dishonesty among data brokers also known as intermediaries in the content distribution systems. The authors focus was on false click profiles and the paper takes an experimental and analytical approach to evaluate the protocols that are used to reduce fabricated attacks and to identify dishonest brokers. The overall project seeks to propose protocols that can be used to verify the honesty of data brokers using standard security. The goal of the project is to assess clients S, publishers, P and network broker B, to assess the count integrity and ensure that client anonymity and information integrity has been upheld. The brokers’ dishonesty will be evaluated if they report wrong counts for the number of times the published data has been accessed. The study components are: The set of publishers Set of clients The network brokers The Process (Mechanism) of this Work; Means How the Problem has Solved& Advantage & Disadvantage of Each Step in This Process The analysis was carried out using a bloom filter solution developed from the broker-payee model. Process Steps Advantage Disadvantage (Limitation) 1 Literature Review Identifies gaps in the study field. Areas of application are different from the study area. 2 Research objectives It orients the research guiding data collection and analysis 3 Data collection and analysis through broker-payee model. The model gave the client a signature to assess their clicks to validate record. The model eliminated false positives. The researcher has no knowledge of existing relationship between brokers and clients that may jeopardise the study. 4 SBF based analysis. The model reduced the false positives as each client had a unique identity. The model also limits broker’s interaction with content. It is not 100% effective and leaves room for false results. 5 Major Impact Factors in this Work Dependent Variable Independent Variable Broker Count Publisher Count Client Clicks Relationship Among The Above 4 Variables in This article The number of client count should be equal to the publisher cunt and the broker should report the same value of client counts. Input and Output Feature of This Solution Contribution in This Work Input Output Publisher content Client clicks Number of clicks per client recorded by the brokers. The findings will be used to assess the validity and reliability of information brokers in the CDN networks. Analyse This Work By Critical Thinking The Tools That Assessed this Work The model allows the CDN network to identify false clicks reported by brokers unless the client and the broker collude. It therefore informs the publishers of any fraud planned by the brokers. In the same way, the protocol tested can be used to analyze security threats and provide a way to address CDN security issues. Such an algorithm would improve on data security and information safety. SBF-based protocol model that assesses the publisher content verses the client and brokers count data. Diagram/Flowchart 3 Reference in APA format Levy, A., Corrigan-Gibbs, H., & Boneh, D. (2016). Stickler: Defending against Malicious Content Distribution Networks in an Unmod
ified Browser. Ieeexplore.ieee.org.ezproxy.csu.edu.au. http://ieeexplore.ieee.org.ezproxy.csu.edu.au/stamp/stamp.jsp?arnumber=744835 URL of the Reference Authors Names and Emails Keywords in this Reference http://ieeexplore.ieee.org.ezproxy.csu.edu.au/stamp/stamp.jsp?arnumber=7448352 Amit Levy, Henry Corrigan-Gibbs, Dan Boneh content distribution networks, publishers, web security, protocol The Name of the Current Solution (Technique/ Method/ Scheme/ Algorithm/ Model/ Tool/ Framework/ … etc ) The Goal (Objective) of this Solution& What is the problem that need to be solved What are the components of it? The research expound on stickler, a tool that allows web users to use the CDN with lower security risks. The model uses Transport Layer Security, TLS, and a tool that is used for data authenticity and to protect its confidentiality across the internet. Stickler is a component that connects the end user to the CDN and the publisher to the CDN and it facilitates the exchange of data for safety. The paper focuses on the use of stickler as a tool that ensures content security and promotes confidentiality across the CDN. The approach seeks to solve data security issues on internet based system. To maintain the benefits of CDN and allow users to be safe while accessing the CDN’s. The Process (Mechanism) of this Work; Means How the Problem has Solved& Advantage & Disadvantage of Each Step in This Process The system uses a Stickler, a protocol that acts as a security check for web browsers as tools of accessing the CDN. The tool allows content publishers to put information on the internet with less risks and it allows clients to access the data with confidentiality across the CDN platform. The technique applied channels the data and breaks the direct connections of the platforms. The model allows access to bulk data reducing the pressure on the publisher’s network. It also maintains a connection with other servers globally allowing access by multiple users. Process Steps Advantage Disadvantage (Limitation) 1 Assessment of the benefits of a CDN network It expounds on the advantage of the research. Limited to role of CDN without understanding how the system works. 2 Assessing the role of Stickler to the CDN system It explains why the study was relevant. There is limited knowledge on the background of stickler as a protocol standard. 3 Identifying limitation to the model. It evaluates areas of more research. 4 Tested the system on Stanford Applied Crypto Group website. The sample size was effective in studying, 617 users. Study was limited to two browsers and one company only. 5 Major Impact Factors in this Work Dependent Variable Independent Variable Data Security Stickler Relationship Among The Above 4 Variables in This article Stickler acts as a tool to improve on data security and reduce threat to both the publisher and the client. Input and Output Feature of This Solution Contribution in This Work Input Output Publisher Client It does not require modification and it works with existing browsers. The tool improves data security across the browsing platforms as well as the CDN channels. It boosts confidence to the users and publishers about data security. Analyse This Work By Critical Thinking The Tools That Assessed this Work Stickler was tested in Stanford Applied Crypto Group website. The analysis shows that out of 617 users, shows that browser influenced the load time and the performance was enhanced by using stickler tool. The tool however is limited in some functionalities. First, the publisher must sign every content released to the CDN and this may be unfeasible for systems with multiple assets. Secondly, when using a stickler-protected site, users are required to perform several verifications for authentication. W3C Subresource Integrity was used as a mechanism to protect the CDN content and check its integrity. Diagram/Flowchart Version 2.0 _ Week 2 4 Reference in APA format URL of the Reference Authors Names and Emails Keywords in this Reference http://dl.acm.org.ezproxy.csu.edu.au/citation.cfm?doid=1041680.1041681 Stephanos Androutsellis-Theotokis Diomidis Spinellis Peer-to-Peer Content Distribution Technologies The Name of the Current Solution (Technique/ Method/ Scheme/ Algorithm/ Model/ Tool/ Framework/ … etc ) The Goal (Objective) of this Solution& What is the problem that need to be solved What are the components of it? The system reviews the peer-to-peer model in the sharing of information as compared to having an intermediary server. Peer-to-peer networks have been reviewed and several definition adopted for the interaction of nodes in the CDN networks. The CDN content distribution in the review was based on the infrastructure routing networks, application, content publishing, and storage. Several Peer-to-peer systems were evaluated for the study. The approach seeks to establish the role of non-functional characteristics and properties of the content distribution network. It also focused on understanding how the design affect the properties and offer ant recommendations to the identified problems. Content distribution network design systems The Process (Mechanism) of this Work; Means How the Problem has Solved& Advantage & Disadvantage of Each Step in This Process Several network designs were identified and analysed for several properties among them anonymity (confidentiality and privacy), security (authenticity and integrity), scalability and availability. The review was assessed to test scalability, fairness, performance and resource use as shown in the diagram below. Process Steps Advantage Disadvantage (Limitation) 1 Identification of Peer-to-peer systems. Brings user to knowledge of different systems It does not get to the details of each system and its purpose of development. 2 Classification of the Peer-to-peer systems to routing and location. This enables the model to be tested for structural functionalities. It provides dynamics of Peer-to-peer systems that enable its functionalities. The information is theorised more and there are no standards of testing. 3 Testing Security with Shamir’s Secret sharing, information dispersal algorithm and other protocols. Provides knowledge of algorithms and protocols present in testing Peer-to-peer systems. The information is mentioned and no analysis was done. 4 5 Major Impact Factors in this Work Dependent Variable Independent Variable Performance Peer-to-peer systems Scalability Resources Management Integrity Relationship Among The Above 4 Variables in This article A well-developedPeer-to-peer system will show positive results for integrity, scalability, resource management and better performance. Input and Output Feature of This Solution Contribution in This Work Input Output Peer-to-peer Systems User Security The use of Peer-to-peer systems can show areas of threats and promote more research on dealing with threats. The data was used to research more on nonfunctional benefits of the CDN networks especially in security. Analyse This Work By Critical Thinking The Tools That Assessed this Work The analysis was based on Peer-to-peer system. Several systems have been mentioned to be adopted for the study however there is little information about the functionality of the systems. The non-functional elements studied are relevant in explaining the benefits of the Peer-to-peer system on a CDN network. The content however focuses on elements that support the development of a Peer-to-peer system and a critical review of the effectiveness of the system in the non-functional areas would help assess the current state of concern. The information however opens up the reader to know areas to research on when trying to evaluate CDN systems security. Literature review was mainly used to define the Peer-to-peer system. Diagram/Flowchart 5 Reference in APA format URL of the Reference Authors Names and Emails Keywords in this Reference http://onlinelibrary.wiley.com.ezproxy.csu.edu.au/doi/10.1002/bltj.20323/full Ivica Rimac – Bell Labs in Holmdel, Sem Borst -Bell Labs in Murray Hill, Anwar Walid- Bell Labs in Murray Hill server architectures Cost Eff
ectiveness High Performance CDN The Name of the Current Solution (Technique/ Method/ Scheme/ Algorithm/ Model/ Tool/ Framework/ … etc ) The Goal (Objective) of this Solution& What is the problem that need to be solved What are the components of it? The research evaluates the inherent use of peer-to-peer networks for sharing large amounts of data. The focus of the study is influenced by the technological advancements in the current day and competing paradigms. The researchers developed a mathematical model to assess several parameters that influence the performance of a CDN, it tests the object size, churn rate, uploading bandwidth, and this is compared in several companies. The paper seeks to prove a hybrid approach in peer-to-peer network by testing for high performance and cost effectiveness of using the proposed model in data sharing. The paper focuses on the internet as a platform that gives an end-to-end connection. The ability of the systems to accommodate high traffic at high performance improves the functionality of the servers. In the past, the traditional model server was used and the researchers have developed a highbred server architecture that will improve on performance. The Process (Mechanism) of this Work; Means How the Problem has Solved& Advantage & Disadvantage of Each Step in This Process In studying the literature review, the team used the concept of bit torrent platform to test the capabilities of the system to handle high traffic, assess the speed in which users can download and to what extent the platform is secure. The hybrid model is set to improve the security and promote a high performance rate for the client-server architecture. The mathematical model developed was tested for high performance, cost effectiveness, churn rate and speeds. Process Steps Advantage Disadvantage (Limitation) 1 Literature review on other studies It saves on time and identifies gaps in the study The information credibility is based on the author’s honesty. Research could also be outdated. 2 Development of the Mathematical model based on the existing template and key areas of study. Saves on costs and time and it validates the approach. The information is yet to be tested to be considered reliable. 3 4 5 Major Impact Factors in this Work Dependent Variable Independent Variable Performance Server performance Cost effectiveness Security Relationship Among The Above 4 Variables in This article The server performance is influenced by the performance, security and the adopted methods should lead to cost effectiveness. Input and Output Feature of This Solution Contribution in This Work Input Output Original Source End user (Customer) The model helps to reduce security threat and improve performance in the CDN networks. It has improved the development of security standards for businesses and enhanced speeds in the servers functioning. Analyse This Work By Critical Thinking The Tools That Assessed this Work The paper evaluated the design of the traditional servers pointing out areas of weakness. This improves on the areas the model can focus on when testing a peer-to-peer CDN. The model developed is mathematical and it reflects the actual functioning of the servers thus it is easy to test it. The model however is limited to advanced technology use, as the systems need to be improved on to achieve the high performance rate. The model therefore needs to be replicated to a real server to establish the validity of the model in practice. High Upload bandwith Speed tests Diagram/Flowchart The chat below describes the CDN concept in a peer-to-peer network: 6 Reference in APA format URL of the Reference Authors Names and Emails Keywords in this Reference http://ieeexplore.ieee.org/document/6032225/?section=abstract Paul Giura – AT&T Security Research Center, New York Gustavo de los Reyes – AT&T Security Research Center, New York Content Delivery Networks CDN Architecture The Name of the Current Solution (Technique/ Method/ Scheme/ Algorithm/ Model/ Tool/ Framework/ … etc ) The Goal (Objective) of this Solution& What is the problem that need to be solved What are the components of it? The research focuses on understanding the functionality of the CDN and identify ways to reduce the cost. Since the researchers believe that a CDN is necessary for any business, the model adopted focuses on the security capabilities of the CDN, its functioning and the cost effectiveness. The paper compares several architecture types to determine the ideal architecture for developing a secure and cost effective CDN system. The goal of the project is to propose a framework that will assess the cost of a CDN system while taking into account the security and functionality of the system. The study components are: The CDN networks Variety of CDN architecture Cost of setting up a secure CDN The Process (Mechanism) of this Work; Means How the Problem has Solved& Advantage & Disadvantage of Each Step in This Process The analysis was carried out using a framework that evaluates the CDN types and their ability to offer security to the users. Process Steps Advantage Disadvantage (Limitation) 1 Literature Review Identifies gaps in the study field. Areas of application are different from the study area. 2 Research objectives It orients the research guiding data collection and analysis 3 Data collection and analysis on various CDN architecture types. The model gave a comparison table that evaluated all the architectures of the CDN rigorously to evaluate the rate performance of each. The researcher feedback is based on an existing system and this could inhibit room for expansive analysis on actual effectiveness of each system. 4 Recommendations The methodology used offers guidelines that can be used in developing a secure CDN. The guidelines are theoretical and can be validated by implementation. 5 Major Impact Factors in this Work Dependent Variable Independent Variable Security CDN Architecture Cost Relationship Among The Above 4 Variables in This article The architecture of the CDN has a direct impact on the security function of the system and it can be developed at a cost effective rate while maintaining its security functions. Input and Output Feature of This Solution Contribution in This Work Input Output CDN architecture Cost and Security performance Functioning of the CDN networks in comparison. The findings will be used to assess the various types of CDN systems and establish which model type is effective in cost and that is secure. Analyse This Work By Critical Thinking The Tools That Assessed this Work The model allows the CDN developers and users determine the systems that works effectively in terms of security and costs. The methodology revealed that for high security in a CDN system does not necessarily mean high costs. Other factors such as speed and time influence costs. The model can therefore be used by the businesses in determining the CDN architecture to apply based on the outcomes desires and the level of security needed. CDN assessment framework is used to compare four CDN architectures and assess the performance and cost of each system. Diagram/Flowchart 7 Reference in APA format Merlin Kurian, L., & Punnoose2, S. (2011). SECURED CONTENT DISTRIBUTION NETWORK USING OPTIMIZED RSA. http://www.airccse.org/journal/ijdps/papers/1111ijdps11.pdf URL of the Reference Authors Names and Emails Keywords in this Reference http://www.airccse.org/journal/ijdps/papers/1111ijdps11.pdf Liji Merlin Kurian [email protected] Saiju Punnoose- [email protected] Data Sharing, Distributed Systems, Integrity, Security. The paper Details The Goal (Objective) of this Solution& What is the problem that need to be solved What are the components of it? The system reviews the role of a CDN in data confidentiality and security as the data moves across the platform. The paper adopts a modified and optimized RSA approach to ensure the security of the data. The model also allows caching of data, enforcement of authenticity and cryptographing using public keys to ensure the data is securely shared and shared at favorable speeds. The approach
seeks to apply RSA model to reduce processing time, improve on storage and enhance security of data shared across a CDN system. RSA model to address concerns of data confidentiality and integrity as it is being shared. The Process (Mechanism) of this Work; Means How the Problem has Solved& Advantage & Disadvantage of Each Step in This Process As most companies try to identify ways that will keep their data secure, system developers also focus on improving the confidentiality of the data as well as performance of the CDN system. Process Steps Advantage Disadvantage (Limitation) 1 Literature review Brings user to knowledge of functioning of different CDN systems It does not get to the details of each system and its purpose of development. 2 Study of System Architecture It provides dynamics understanding of how data flows across the CDN systems and it helps establish areas of improvement. The information is theorised more and there are no standards of testing. 3 Content Service Analysis Types of content shared across the CDN are analysed to establish the type of encryption needed for each. This improves on the quality standard for encryption. The study was limited to common data types and not on all available data types. 4 5 Major Impact Factors in this Work Dependent Variable Independent Variable Integrity Data type Confidentiality Security Relationship Among The Above 4 Variables in This article The data type influences the choice of data security, integrity and confidentiality needed to improve the CDN security. Input and Output Feature of This Solution Contribution in This Work Input Output Data Data Security The algorithm adopted (using keys) shows areas of improvement and this enhances security through the data sharing processes. The data was used to research more on nonfunctional benefits of the CDN networks especially in security. Analyse This Work By Critical Thinking The Tools That Assessed this Work The analysis presented a solution on CDN security by using a scalable and diverse architecture of CDN using XML. The optimized RSA offered the user authentication protocol on validity and confidentiality. The system is applicable in a large system and the data type influences the protocol applied. The approach improves the performance of the CDN systems and it supports parallel services and users. The model is easy to adopt as no modification are needed in the CDN network and the approach is able to achieve many functionalities at a go. The RSA approach is also easily adaptable to new systems making it an ideal approach in CDN network enhancements. The tool was tested in a CDN system to provide the results needed in validating the application of RSA on performance and security enhancement. Diagram/Flowchart Literature Review (Secondary Research)Template 8 Reference in APA format Saponara, S., & Bacchillone, T. (2012). Network Architecture, Security Issues, and Hardware Implementation of a Home Area Network for Smart Grid. Journal Of Computer Networks And Communications, 2012, 1-19. http://dx.doi.org/10.1155/2012/534512 URL of the Reference Authors Names and Emails Keywords in this Reference https://www.hindawi.com/journals/jcnc/2012/534512/ Sergio Saponara Tony Bacchillone Smart Grid Security Management Policy Wireless Netwok The Research Summary The Goal (Objective) of this Solution& What is the problem that need to be solved What are the components of it? The research evaluates security measures adopted across a smart Grid system. This is a system that provided networks across the Home area network (HAN), local area network (LAN), and wide area network (WAN). The smart grid is a network of networks and the research assesses the existing power grids, evaluating the security architecture of the Grid and gives policy recommendation to enhancing the network security. The fining of the research are applicable to CDN system security applications The paper seeks to establish hardware and –shelf software architecture that can be applied off shelf for enhancing security and proper functioning of the smart grid. The research also gives policy recommendations for managing HAN. The paper focuses on the data sharing platforms adopted from Area Networks and the focus is to establish ways to enhance grid security and performance that will translate to the improvement of CDN platforms. The research looks at offline security approaches that will provide data in servers still connected to the grid. The Process (Mechanism) of this Work; Means How the Problem has Solved& Advantage & Disadvantage of Each Step in This Process The paper focused on HAN network as a power grid. The review of the power grid was later compared to the smart grid system to enhance the fow of security across the platform. Process Steps Advantage Disadvantage (Limitation) 1 Literature review on the power grid. It gives the reader applicable practice on flow of energy across its network. The example gives a comparison that may not fully replicate the CDN systems. 2 Analysis of the HAN network. It exposes the reader to network components for a house network. It also evaluates approaches used on developing the network. The constant comparison of HAN and Power systems may confuse the reader. 3 4 5 Major Impact Factors in this Work Dependent Variable Independent Variable Confidentiality HAN Availability Integrity Relationship Among The Above 4 Variables in This article The HAN system should enhance confidentiality of data and users, should be available and it should promote integrity. Input and Output Feature of This Solution Contribution in This Work Input Output Data Smart Grid The algorithm model opens the reader o understanding the important components of the HAN that require security upgrade. The mode can be adopted for any network model to enhance security and reduce threats to the system. Analyse This Work By Critical Thinking The Tools That Assessed this Work The approach is unique as it starts from evaluating how a power grid functions and the same concept is brought to a HAN network. The researchers perceived that relating to an existing network flow will enhance the understanding for CDN systems. The model can be used for threat analysis, segmentation, encryption, source codes review, firewall setting, logging, monitoring, and authentication. The flow of research leads to recommendation on policy solutions for smart Grid systems (CDN). The model also gives an outlook for both hardware and software components in improving security in Networks. Smart Grid PKI tools ZigBee Diagram/Flowchart The chat below describes the Smart energy HAN general architecture: 9 Reference in APA format PATERSON, N. (2014). End User Privacy and Policy-Based Networking. Journal Of Information Policy, 4, 28-43. http://dx.doi.org/10.5325/jinfopoli.4.2014.0028 URL of the Reference Authors Names and Emails Keywords in this Reference http://www.jstor.org/stable/pdf/10.5325/jinfopoli.4.2014.0028.pdf?refreqid=excelsior%3A90a1c64ee2dae91a6a22c5eae7a1f6f4 Nancy E Paterson Privacy Network Operators Policy Based Networking The Research Summary The Goal (Objective) of this Solution& What is the problem that need to be solved What are the components of it? The researcher assesses the issue of network service providers and the role they play in data privacy. Network operators and service providers influence the privacy of data from their systems however; the government also plays a major role in privacy. Amidst the rumors that the U.S governments surveil people’s personal information, it is therefore necessary to understand how the system security is built to protect the confidentiality of the users. The goal of the research is to recommend privacy policies that will safeguard users and enhance the security implemented by network operators and internet service providers. The study focuses on privacy of operators and users using internet in CDN systems. The Process (Mechanism) of this Work; Means How the Problem has Solved& Advantage & Disadvantage of Each Step in This Process The research analysed policy based approaches to evaluate the quality of service of ne
tworks providers and their ability to promote privacy of users. Process Steps Advantage Disadvantage (Limitation) 1 Literature Review Identifies the issues in privacy by understanding the CDN The review on policy is limited and there are other areas that the research could have focused on privacy. 2 Research objectives It orients the research guiding data collection and analysis It may limit the scope of the researcher to one area. 3 Assessment of End User privacy A real case study of Canada was applied making the research valid. The research was limited to the level of security in the system. 4 Recommendations The research gives a new approach that will address privacy concerns using policies. The challenge of the study is that privacy is theoretical and its description varies based on individuals. 5 Major Impact Factors in this Work Dependent Variable Independent Variable Privacy Network Systems Security Relationship Among The Above 4 Variables in This article The issue of data security and privacy influences all data users in the CDN system. Input and Output Feature of This Solution Contribution in This Work Input Output Data Privacy Every user in the CDN system requires privacy of their identity and confidentiality of the data shared. The research evaluates the role of policy research in improving privacy on CDN systems. A new approach called, “the economy of Privacy” is introduced to show that economic gains outweigh users privacy. Analyse This Work By Critical Thinking The Tools That Assessed this Work The research evaluates systems of network operators and data providers in ensuring data privacy. The paper evaluates multiprotocol label switching that encrypts the private data while transmitting it through the CDN. Other systems evaluated are Mobile IPv6 and Software Development Networks. In evaluating how the systems work, loopholes in data privacy are identified and improved to enhance the quality of the research. The Mobile IPv6, multiprotocol label switching, and Software Development Networks offered a case study n privacy concerns in the CDN systems. Diagram/Flowchart 10 Reference in APA format Bays, L., Oliveira, R., Barcellos, M., Gaspary, L., & Mauro Madeira, E. (2015). Virtual network security: threats, countermeasures, and challenges. Journal Of Internet Services And Applications, 6(1). http://dx.doi.org/10.1186/s13174-014-0015-z URL of the Reference Authors Names and Emails Keywords in this Reference https://jisajournal.springeropen.com/track/pdf/10.1186/s13174-014-0015-z?site=jisajournal.springeropen.com Leonardo Richter Bay Rodrigo Ruas Oliveira1 Marinho Pilla Barcellos Luciano Paschoal Gaspary Edmundo Roberto Mauro Madeira Network virtualization Security Threats Countermeasures The Research Summary The Goal (Objective) of this Solution& What is the problem that need to be solved What are the components of it? The paper reflects on Virtual networks created in a system for hosting as servers. A system can havemultiple independent virtual network in a single system forming a Distribution Network. The analysis helps discover the security threats that exist in a system and the paper proposes counter measures to deal with security threats. The paper analyses virtual network platforms for data sharing and access and it identifies the security vulnerabilities in the system to propose ways of dealing with the threat. The Virtual Network Systems are the main component for the study. The Process (Mechanism) of this Work; Means How the Problem has Solved& Advantage & Disadvantage of Each Step in This Process In virtual computational systems, there are many potential security threats and the study seeks to identify them, evaluate ways to dealth with the threat to protect the data on the platform. Process Steps Advantage Disadvantage (Limitation) 1 Introduction of Virtual Network It enables the reader understand Data Flow in a network and highlights on areas of threat. It is limited to already done research and new threats may be missed. 2 Evaluating the security threats in the Networks. It breaks down types of threats and enables direct action to deal with each threat. There is limited knowledge on the background of stickler as a protocol standard. 3 Recommendations. It proposes areas to improve for dealing with security risks. Solutions have not been tested to validate the effects. 4 5 Major Impact Factors in this Work Dependent Variable Independent Variable Data Security Virtual Networks Relationship Among The Above 4 Variables in This article Virtual Networks are prone to threats as they allow data sharing in a secure platform. Input and Output Feature of This Solution Contribution in This Work Input Output Publisher User Virtual Systems provide networks for data sharing that needs to be secure. The approach shows existing security options for Virtual networks and areas that can be improved on security. It also points out to areas that have been less researched in virtual network security to advance more research. Analyse This Work By Critical Thinking The Tools That Assessed this Work The virtual networks systems have infrastructure with multiple architecture that allows data sharing via the internet. The networks are prone to threats as multiple users gets into the system. The study breaks down the type of security threats and identifies ways to deal with the unattended threat. The research also points to areas that can be further researched. The approach makes it easier to study security threats and propose solutions to fix the existing problems. A study on Virtual Network architecture on an SDN platform to understand the security threats and assess how the issue has been dealt with in the past. Diagram/Flowchart Version 2.0 _ Week 2 11 Reference in APA format Muthuselvi, M., Jeevananthini, P., & Vijayakumar, B. (2015). Enhancing Authentication Protocol from Unauthorized Access. IJCSNS International Journal Of Computer Science And Network Security, VOL.15(No.1). URL of the Reference Authors Names and Emails Keywords in this Reference http://paper.ijcsns.org/07_book/201501/20150121.pdf M.Muthuselvi, P.Jeevananthini, B.Vijayakumar Stream authentication, Cryptography Content distribution Network Trap door functions. The Research Summary The Goal (Objective) of this Solution& What is the problem that need to be solved What are the components of it? The research assesses ways to enhance authentication protocol security from unauthorized users’ access. The outlook is on CDN networks that share mainstream data and the research seeks to explore existing security measures while proposing new authorization techniques that will protect the system users. The system adopted monitors the communication overhead in blocks to minimize risks of systems being accessed by unauthorized persons. The research focuses in solving the challenges in effective stream authentication and verification systems using digital signatures. The goal of the study is to give the data authenticity, and integrity based on the source. The technique explore several CDN systems: Timed Efficient Stream Losstolerant Authentication (TESLA) Efficient Multi-chained Stream Signature (EMSS) The Process (Mechanism) of this Work; Means How the Problem has Solved& Advantage & Disadvantage of Each Step in This Process Data users on a CDN network desire security and privacy as they access data via the internet platforms. Threats of access of the data by unauthorised users should therefore be considered by data providers and network operators to promote confidence on the platforms. Process Steps Advantage Disadvantage (Limitation) 1 Literature review Brings user to understand authentication protocols used in securing users privacy. It selects only a few protocols to study. 2 Study of System Architecture It provides understanding of how data is secured across the CDN systems and brings understanding to components of an authentication system. Technological change is not reflected in the system flow. 3 Assessment of Online Authentication. It gives an online digitized signature to safeguard the users. . The block are not constant an
d this may open a threat for forgery. 4 5 Major Impact Factors in this Work Dependent Variable Independent Variable User Security Authentication Systems Stream flow Data Network Relationship Among The Above 4 Variables in This article The authentication by users adopted by network providers should offer security in the stream flow of data network. Input and Output Feature of This Solution Contribution in This Work Input Output Data Operators Data Users The model evaluates the use of trapdoor hash functions as an authentication protocol for user authentication. The use of trapdoor hash functions will improve the digitized signature to enhance authentication on online system. The system will also restrict unauthorized access. Analyse This Work By Critical Thinking The Tools That Assessed this Work The analysis on the existing system has loopholes on unauthorized access on online platforms. The analysis on trapdoor hash functions identifies areas that there are concerns and by improving on the system, the performance is enhanced. Online platforms have however faced challenged on the changing communication blocks that influence transmission. The use of the signature on trapdoor hash functions improves authentication in block streams. The trapdoor hash functions adopts the online digitized platform to enhance security of the users in mainstream CDN systems. Diagram/Flowchart The data shows the flow of data on the CDN platform. Literature Review (Secondary Research)Template Student Name Husam malkawi Project Topic Title Security in distribution network, CDN 12 Reference in APA format Rajeswari, P., & Ravi, T. (2017). A Novel SERIeS Algorithm for Enhancing Link Stability and Security in Manet. Journal Of Applied Security Research, 12(2), 287-303. http://dx.doi.org/10.1080/19361610.2017.1277888 URL of the Reference Authors Names and Emails Keywords in this Reference http://www-tandfonline-com.ezproxy.csu.edu.au/doi/pdf/10.1080/19361610.2017.1277888?needAccess=true Trichy Tamil Nadu- E.V.R College Rajeswari.P – [email protected] Mobile ad-hoc networks (MANET), link state information, reactive routing, optimal path The Name of the Current Solution (Technique/ Method/ Scheme/ Algorithm/ Model/ Tool/ Framework/ … etc ) The Goal (Objective) of this Solution & What is the problem that need to be solved What are the components of it? The paper reviews Mobile Ad-hoc Network, MANET, and it analyses the challenges that affect the performance of the system. The focus of the study is the routing process implemented in the network. The router operates using link state routing program to channel information to the nodes. Sometimes all the information may not be part of the communication thus the high traffic interferes with the communication. The review seeks a way to manage the traffic using Secure-dEed-Reflection-Inducement-eState, SERIeS. The paper seeks to reduce the unnecessary traffic in the Mobile Ad-hoc Network, MANET by restricting the information that goes to the server nodes while maintain the channels secure. The routing process is a channel that allows information to pass via its nodes. The current approach seems inefficient in management of the content received by the nodes. Secure-dEed-Reflection-Inducement-eState, SERIeS, is a model adopted to restrict only relevant information to the nodes to the MANET system and it offers security and stability to the system. The Process (Mechanism) of this Work; Means How the Problem has Solved & Advantage & Disadvantage of Each Step in This Process Secure-dEed-Reflection-Inducement-eState, SERIeS is the algorithm adopted for remedying the situation. The novel algorithm leads to the development of a learning agent that is able to link the states database and establish the right route for the information. The learning agent established the bandwidth, energy and length capacity of the node to enable the nodes to link to the database the content. The database offers the source of data for all the nodes thus making the channels secure and with less traffic. Process Steps Advantage Disadvantage (Limitation) 1 Literature review on MANET The existing challenges are reviewed to offer the ideal solution. The information may limit other challenges that are not related to performance. 2 Proposal of the Secure-dEed-Reflection-Inducement-eState, SERIeS and testing. The system improved the performance of MANET by reducing traffic and enhance security. The link will be verified after implementation for efficiency. 3 4 5 Major Impact Factors in this Work Dependent Variable Independent Variable Security MANET performance Link Stability Relationship Among The Above 4 Variables in This article The performance of MANET is influenced by the routing network traffic, security and stability of the network Input and Output Feature of This Solution Contribution in This Work Input Output MANET SERieS The model will improve performance and stability of the MANET system. The study introduces an algorithm that improves the performance of the MANET system while enhancing security. Analyse This Work By Critical Thinking The Tools That Assessed this Work The study was focused on studying and improving the performance of the MANET system. The approach was objective to the role of MANET and its performance thus making identification of the problem easy and the solutions offered were specific to the system. The proposed algorithm functions effectively by using a common database to link all the nodes and it ensures that the content shared via each node is needed by the user. The approach proposed reduces traffic and it enhances the security of the nodes thus influencing a positive change in the MANET system performance. MANET Secure-dEed-Reflection-Inducement-eState, SERIeS Diagram/Flowchart The image below describes MANET system. 13 Reference in APA format Moustafa, K., & Hafid, H. (2017). Self-Identification of Boundary’s Nodes in Wireless Sensor Networks. Journal Of Information Processing Systems. http://dx.doi.org/10.3745/jips.03.0062 URL of the Reference Authors Names and Emails Keywords in this Reference http://jips-k.org/q.jips?cp=pp&pn=437 Moustafa Kouider Elouahed Hafid Haffaf Boundary Recognition, Military Surveillance, Wireless Sensor Network Military Applications, The Name of the Current Solution (Technique/ Method/ Scheme/ Algorithm/ Model/ Tool/ Framework/ … etc ) The Goal (Objective) of this Solution & What is the problem that need to be solved What are the components of it? The study evaluates the challenges of wireless sensor networks, WSNs in military surveillance. The system operates with nodes that send signals to the main system over heterogeneous topologies. The system however experiences challenges in the identification of the nodes. Since there are multiple nodes, the system has a challenge in identifying border nodes and it takes more time and energy to retrieve information from the securely. The study identifies an algorithm to establish boundary nodes from other routing nodes. The study aimed at establishing boundary nodes distinctively from other nodes to make data surveillance and retrieval efficient and effective in military operations. The study focuses on: Boundary Nodes. Starter nodes Content Delivery Network The Process (Mechanism) of this Work; Means How the Problem has Solved & Advantage & Disadvantage of Each Step in This Process The analysis developed a process of detecting border nodes and improving starter nodes as a means to promote the discovery of the boundary. Process Steps Advantage Disadvantage (Limitation) 1 Literature Review Expounds on the WSN systems and their benefits to military application. The study was limited and the scope limited the solutions given. 2 Solution The proposal given in line with the study objective and an algorithm was developed. The scope was limited to boundary and starter nodes distinction. 3 4 5 Major Impact Factors in this Work Dependent Variable Independent Variable Border Node Network Discovery Performance Starter Node Relationship Among The Above 4 Variables in This article The nodes are channels of sharing
content retrieved from the field and in improving the Network discovery systems, information sharing is enhanced. Input and Output Feature of This Solution Contribution in This Work Input Output Nodes Network Delivery System The system identifies the nodes efficiently making data access easy. The algorithm developed improves the detection of boundary nodes, thus making data from the boundary system easily discoverable Analyse This Work By Critical Thinking The Tools That Assessed this Work The nodes have different spatial locations and the system identifies the border nodes as they are farther away. The analysis using radius maps out the furthest nodes and a boundary is developed around the nodes. The communication with the system improves the data access process by making Boundary Nodes unique thus, accessing data from the nodes becomes fast, and the packets shared are within reasonable range. The system acts as a starter algorithm to solve the data access process; however, there is need to advance the algorithm to factor other nodes and to uniquely identify each node to make the data sharing more specific. The research proposed a self-identification algorithm that distinguishes boundary and starter nodes to efficiently construct a geometry that sets apart the boundary. Diagram/Flowchart 14 Reference in APA format Kazmi, S., Shahzad, M., Khan, A., & Shin, D. (2017). Smart Distribution Networks: A Review of Modern Distribution Concepts from a Planning Perspective. Energies, 10(4), 501. http://dx.doi.org/10.3390/en10040501 URL of the Reference Authors Names and Emails Keywords in this Reference https://search-proquest-com.ezproxy.csu.edu.au/docview/1899817909?rfr_id=info%3Axri%2Fsid%3Aprimo Syed Ali Abbas Kazmi Muhammad Khuram Shahzad Akif Zia Khan Dong Ryeol Shin Smart Distribution Network Smart Grid Microgrid The Name of the Current Solution (Technique/ Method/ Scheme/ Algorithm/ Model/ Tool/ Framework/ … etc ) The Goal (Objective) of this Solution & What is the problem that need to be solved What are the components of it? The paper reviews the smart distribution network, SDN as the current trend on data sharing network. The paper uses SG technology to improve the traditional distribution network by making the SDN intelligent and efficient in operation. The paper evaluates some of the areas to evaluate in planning the SDN. They include policies and prototypes, expected functionalities of the system, objectives to achieve, smart grid technologies, and potential characters the system would handle. The models proposed would improve on the SGN by optimizing reality as experienced. The research seeks to give solutions to existing and potential problems modelled by studying the core factors needed to develop an SDN and proposing guidelines for the development of a functional and efficient SDN. The system is developed by evaluating: Policies Pilot Projects Functionality Potential Candidates for SDN Smart Grid technology The Process (Mechanism) of this Work; Means How the Problem has Solved & Advantage & Disadvantage of Each Step in This Process The development of an SDN system is aimed at improving the functionality of data sharing network, making it more intelligent and effective for the end user. The paper evaluates key areas of concern for the SDN system that need to be studied, understood before planning for the system. The development of the approach evaluates the benefits and challenges before developing the network to help in coming up with a functional and effective Smart SDN. Process Steps Advantage Disadvantage (Limitation) 1 Literature Review It introduces the readers to the need of an SDN network and the functionalities of a Distribution Network. There is limited research in the SDN application that means most information is theoretical. 2 Planning for an SDN system It breaks down the study to specific objectives thus saving time and improving on quality of research. The scope may leave out factors that may influence the system outside the adopted scope. 3 Evaluating components of an SDN It expounds on areas of focus for the research. 4 Guidelines for Developing an effective SDN The recommendation are given as tools for implementation. This can be validated by testing the proposed models. 5 Major Impact Factors in this Work Dependent Variable Independent Variable SG Technologies SDN Distribution Networks Model Relationship Among The Above 4 Variables in This article The SDN is developed upon the existing smart technologies and its enabling environment and upon knowledge of how distribution Networks Function. Input and Output Feature of This Solution Contribution in This Work Input Output DN/ SG Technologies SDN The system requires evaluation of varying components to make it fully functional. The planning of the SDN will improve the Distribution Network and form a foundation for the development of a functional SDN system. The system will also enhance security of the data shared. Analyse This Work By Critical Thinking The Tools That Assessed this Work The authors approach is objective as it breaks down the role of a DN network and it develops the SDN based on concepts considered relevant for the smart Grid. The approach to evaluate several models for a DN opens up the reader to a scope of distribution systems and it assess how the functionalities can be improved to smart systems. The evaluation of smart homes and cities also expresses the use of smart technologies to improve the SDN. The policies evaluated from seven counties also influences the guidelines for the SDN and by evaluating the policies, there is a clear outcome of what is acceptable and what is not in an SDN system. The analysis is based on Smart Grid, SG technologies, multi-objective planning and Distribution Network approaches. Diagram/Flowchart The chart below gives the proposed smartgri system for the distribution Network. Version 2.0 _ Week 2 15 Reference in APA format Kaul, S., & Awasthi, A. (2017). Privacy Model for Threshold RFID System Based on PUF. Wireless Personal Communications, 95(3), 2803-2828. http://dx.doi.org/10.1007/s11277-017-3965-1 URL of the Reference Authors Names and Emails Keywords in this Reference https://link-springer-com.ezproxy.csu.edu.au/content/pdf/10.1007%2Fs11277-017-3965-1.pdf Sonam Devgan Kaul – [email protected] Amit K. Awasthi Mutual authentication Threshold secret sharing RFID One way hash function The paper Details The Goal (Objective) of this Solution & What is the problem that need to be solved What are the components of it? The paper reflects on ways to promote secure communication when sharing data through unsecure channels. The model adopted is the use of the RFID system as a threshold for privacy. The RFID tags used in the models will enhance anonymity as the content changes during runs to make the communication anonymous and the system is developed to provide privacy and data security. The system aims to improve data security in an unsecure system and the paper seels to show how RFID tags can be used to achieve the desired outcome. The RFID tag is the model adopted to enhance the security of data sharing networks. The Process (Mechanism) of this Work; Means How the Problem has Solved & Advantage & Disadvantage of Each Step in This Process RFID technology has improved security systems with a secure server with a back-end connection and its implementation is at a low cost. The system improved on Physically Unclonable Function, PUF, a new technology in security that improves on challenges by giving it the appropriate response. The RFID systems uses the concept of secret sharing threshold to control how data is shared among the various tags. Process Steps Advantage Disadvantage (Limitation) 1 Literature review The study forms a background knowledge of RFID technology. The study scope was limited to one approach. 2 RFID Framework The system has been applied in other system and it has been known to work. The information is theorised and it has not been tested. 3 Security and Privacy Analysis The analysis of RFID to improve on security and the privacy validates the proposal. The anal
ysis is proposed in times of theories and it has not yet been placed.. 4 5 Major Impact Factors in this Work Dependent Variable Independent Variable Efficiency RFID system Privacy Security Relationship Among The Above 4 Variables in This article The adoption of the RFID technology will improve on privacy, security and efficiency of the data sharing systems. Input and Output Feature of This Solution Contribution in This Work Input Output Data / User Data Security The RDIF technology is added to the distribution network to enhance data security and improve on the privacy of the users. A mathematical model was adopted to carry out the analysis on the functionality of the RFID system. The analysis will be used to integrate an RFID technology into data communication network to enhance security of the users and the privacy of the data shared. Analyse This Work By Critical Thinking The Tools That Assessed this Work The use of an inbuilt PUF in the RFID system clones the date networks and enhances the anonymity of the users, the data shared, and this improves on the security of the data. Since each tag in the system has a unique character, cloning the features is impossible. Some of the features that make the tag unique include power supply, electromagnetic interference, and temperature among others. The tags make the data untraceable as well as the user in the system. The performance of the system is evaluated using the efficient evaluation tool that has several formulas for testing the efficiency of the RFID threshold for security. Diagram/Flowchart The table shows the functionality of the system: Literature Review (Secondary Research)Template Student Name Project Topic Title 16 Reference in APA format URL of the Reference Authors Names and Emails Keywords in this Reference http://journals.sagepub.com/doi/pdf/10.1177/1550147717725698 Liang Pang Xiao Chen Yong Shi Zhi Xue Rida Khatoun Jamming attack Fuzzy c-means, Network The Research Summary The Goal (Objective) of this Solution& What is the problem that need to be solved What are the components of it? The paper gives an analytical review of wireless jamming attacks that occur in vehicular ad hoc networks. The authors cite wireless jamming as a major threat to a network security and they interfere with the performance of the network. The paper uses an algorithm to determine the flow of vehicles system by dealing with jamming attacks to enable the system function effectively and safely. The focus is on connection between control channels and server and the internet behaviour in the connectivity. The paper focuses on reducing jamming attack on the internet based network system to enhance the performance and security of a vehicular control system. The components adopted for the study include the internet, the server, the control channels, the network and the trust authority that enhance security. The Process (Mechanism) of this Work; Means How the Problem has Solved& Advantage & Disadvantage of Each Step in This Process The paper evaluates the number of jammers in the network and it is able to create the points of entry and block them to enhance the performance of the ad hock network system. Process Steps Advantage Disadvantage (Limitation) 1 Introduction (Analysis of the ad hock network.) It introduces the reader to the functioning of the ad hock system and the problem experienced. The part may be subjective to the readers’ bias. 2 Literature Review It gives the reader other approaches adopted by ad hock systems in handling the issues. The scope is limited and some options may be overlooked. 3 Algorithm analysis The section gives a breakdown of how the anti-jamming process will be handled and solved. It is theoretical and it has not been tested for verification. 4 5 Major Impact Factors in this Work Dependent Variable Independent Variable Security Vehicular Ad hock Network (VANET) Performance Anti-Jamming Relationship Among The Above 4 Variables in This article The effectiveness of the Ad hock Network is enhanced by eliminating jammers that will improve performance and system security. Input and Output Feature of This Solution Contribution in This Work Input Output Data VANET The algorithm model is operated in MATLAB and it is simulated for urban traffic. The data is first classified using weight fuzzy analysis and then it is run through the algorithm to identify hotspot of jammers for the blocking. The model is applicable in urban management of traffic where systems rely on the networked interactions of control channels to convey signals. Analyse This Work By Critical Thinking The Tools That Assessed this Work The vehicular system operates in a network system that communicates to different transmitters or control channels. The system is prone to jamming by intruders and this would lead to inefficiencies of the system. The algorithm assesses data collected from the system to develop potential hot spots for jamming and the algorithm runs to determine the areas for action. The model will help to reduce interference in the vehicular systems making the network more secure and efficient in its operations. Wight Fuzzy C mean analysis MATLAB Diagram/Flowchart The diagram below shows the interactions of components of the VANET system: 17 Reference in APA format URL of the Reference Authors Names and Emails Keywords in this Reference http://journals.sagepub.com/doi/full/10.1177/1550147717726310 Sébastien Faye Walter Bronzi Ibrahim Tahirou Thomas Engel Privacy Mobile Computing Human Mobility Network The Research Summary The Goal (Objective) of this Solution& What is the problem that need to be solved What are the components of it? The recent technology advancements have improved computing and sensing systems. This can be evidenced by the use of smart devices such as smartphones and watches. The paper evaluates human’s capabilities that have been enhanced by using sensors, to what extent and the issues associated with the advancement. Among the key concerns is the privacy offered to the users and possibility of traces in the network. The research aims to give the users anonymity in the use of technological platforms as a means to enhance privacy for the users. The study also seeks to study user mobility to understand how humans behaviour changes influenced by technology changes. The study evaluates technology advancements, sensors, and their use through advanced networks such as Bluetooth, and Wi-Fi. The Process (Mechanism) of this Work; Means How the Problem has Solved& Advantage & Disadvantage of Each Step in This Process The empirical research was conducted on human using Bluetooth and Wi-Fi devices over a period of time. The sample population were monitored using their devices networks and their movement was mapped spatially, analysed to give potential analysis to mobility and privacy. Process Steps Advantage Disadvantage (Limitation) 1 Introduction The section introduces the scope of the work and the existing technological trends. The section was brief considering the paper lacked literature review. 2 Methodology The section presents the data collection and analysis effectively with visual support. The section lacks tabular data that can enhance the quality of data. 3 Conclusion It gives an analysis of the outcome. 4 5 Major Impact Factors in this Work Dependent Variable Independent Variable Mobility Smart Sensor Networks Privacy Relationship Among The Above 4 Variables in This article The issue of data security and privacy influences all data users in the CDN system. Input and Output Feature of This Solution Contribution in This Work Input Output Smart Devices Mobility The sensor signals was used to build a network of user interaction with the environment. The data is relevant in human mobility systems such as fleet management, traffic controls, and flow optimization. The system provides data, which is beneficial in decision-making. Analyse This Work By Critical Thinking The Tools That Assessed this Work The paper studies mobility of human beings using the Bluetooth and Wi-Fi monitoring. The paper clearly shows that human privacy can be breached easily and t
here is need to enhance data that can be accessible through sharing platforms and sensors. The choice of 13-sample cab ne small to replicate the total population however it was effective to study the use of the sensor technology. There devices tested give human mobility patterns and the data helps to gauge psychological, spatial and environmental data necessary for planning. The data was collected using the SWIPE system, an open source system that collects data and it allows manipulation of data. Diagram/Flowchart The diagram represents data recorded from sensors using smart devices. 18 Reference in APA format URL of the Reference Authors Names and Emails Keywords in this Reference http://journals.sagepub.com/doi/full/10.1177/1550147717727461 Jinxia Wei Xinxin Niu Ru Zhang Jianyi Liu Yuangang Yao Data Integrity Cloud Server Deduplication The Research Summary The Goal (Objective) of this Solution& What is the problem that need to be solved What are the components of it? The paper evaluates the deduplication process that seeks to save storage in the cloud server while maintaining data security. The analysis explains how the cloud server works, and it gives the need for deduplication as a means of making the storage efficient. The proposal is to develop a data verification system that has a deduplication component that will also help to reduce the cost in communication and data computation. The aim of the paper is to propose a deduplication approach that maintains data security for the stored content and the users. The paper evaluates the cloud service providers, Data security and data storage systems. The Process (Mechanism) of this Work; Means How the Problem has Solved& Advantage & Disadvantage of Each Step in This Process The process follows the data storage in the system and how communication takes place. The focus is to reduce duplication of data while maintaining the systems integrity. Process Steps Advantage Disadvantage (Limitation) 1 Introduction The paper gives an account of how cloud data storage and security operates. The paper fails to give an analysis of emerging issues leading to the study. 2 Related Works The section gives a review of what other researchers had done in the field of research that contributes to the solutions adopted. The research is secondary and it has not been tested. 3 Recommendations. The research gives a solution for eliminating duplicity while maintaining data security. The process is theoretical and if tested it can be validated to be applicable. 4 5 Major Impact Factors in this Work Dependent Variable Independent Variable Deduplication Cloud Storage Data Integrity Relationship Among The Above 4 Variables in This article To get the cloud storage system functioning effectively deduplication needs to be done while maintaining data integrity. Input and Output Feature of This Solution Contribution in This Work Input Output Data Cloud System Cloud systems provide data sharing and storage services for variant users. The outcome will help to manage a cloud storage system by eliminating duplicated data while promoting the security of the data and the privacy of the users. Analyse This Work By Critical Thinking The Tools That Assessed this Work The research simplifies the data flow in the system making it easier to identify the components that make us a cloud computing system. The approach adopts an algorithm that identifies the signatures in the database and it identifies identical data and deletes it from the storage to free up space. The approach taken ensures that illegal users cannot access data in the system. The data was analysed using cloud computing system, data possession model and cryptographic mechanisms that restrict unauthorised use. Diagram/Flowchart The data below shows the groups in a clou computing system. Version 2.0 _ Week 2 19 Reference in APA format URL of the Reference Authors Names and Emails Keywords in this Reference https://www.hindawi.com/journals/js/2016/6047023/ Hui He -Harbin Institute of Technology Dongyan Zhang – University of Science and Technology Beijing Xing Wang – Harbin Institute of Technology Min Liu – Harbin Institute of Technology Weizhe Zhang – Harbin Institute of Technology Junxi Guo – Harbin Institute of Technology Wireless Networks Communication Security Ad hoc Networks Multitask Learning Method The Research Summary The Goal (Objective) of this Solution& What is the problem that need to be solved What are the components of it? The paper reflects the issue of wireless network security and privacy with emerging trends in the field. The paper reflects research on wireless sensors and using a multi-task learning approach for forecasting. The model separates wireless networks into topologies to forecast attacks on the system. The goal of the study is to identify security threats in wireless network and promote system approach that will enhance data security and privacy. The analysis evaluated Cryptography Wireless Networks Computing Community The Process (Mechanism) of this Work; Means How the Problem has Solved& Advantage & Disadvantage of Each Step in This Process Process Steps Advantage Disadvantage (Limitation) 1 Introduction The part introduces threats to wireless networks providing information that guided the research paper. The section is brief and very technical. 2 Literature Review/ Methodology The paper gives an analysis of multitasking learning approach to enhance security. The paper lacks some conclusive analysis that leads to a conclusive outcome. 3 . 4 5 Major Impact Factors in this Work Dependent Variable Independent Variable Data Security Wireless Systems Multi-task learning Relationship Among The Above 4 Variables in This article The Wireless systems provide multitasking networks while enhancing data security. Input and Output Feature of This Solution Contribution in This Work Input Output Wireless Networks Data Security The multitasking learning method allows wireless network to conduct several function securely. The research improves on large-scale security for wireless systems. Analyse This Work By Critical Thinking The Tools That Assessed this Work The data gives a theoretical analysis of wireless sensor networks and how the system functions. The algorithm presented informs of how the system blocks threats and efficiently handles multiple tasks. The network topology makes it easier to understand the network system. The empirical study also enhanced the outcome of the study making it an evidence-based research. The model uses multitask learning methods and simulation approaches to enhance the outcome. Gnuella and Worm attacks simulates the network to forecast areas of potential threats. Diagram/Flowchart The chart shows a multitask learning algorithm and how it functions. 20 Reference in APA format URL of the Reference Authors Names and Emails Keywords in this Reference https://www.hindawi.com/journals/js/2016/5017248/ Katarzyna Mazur -Maria Curie-Sklodowska University Bogdan Ksiezopolski- Maria Curie-Sklodowska University Radoslaw Nielek Wireless Networks Security Attacks Protection Modelling Language DDoS attacks The Research Summary The Goal (Objective) of this Solution& What is the problem that need to be solved What are the components of it? The research points to security attacks threats in a wireless sensor networks. Distributed Denial of Services, DDoS is major threat to mobile sensors and since mobile technology has limited resources, the paper seeks to develop a cost effective way to handle the problem. A multilevel analysis was conducted to establish how the problem could be fixed and the delays limited. The study aims to reduce the DDoS attacks and improve the performance of wireless networks. The analysis is based on Modelling Language Wireless Networks Simulation of Systems The Process (Mechanism) of this Work; Means How the Problem has Solved& Advantage & Disadvantage of Each Step in This Process Process Steps Advantage Disadvantage (Limitation) 1 Introduction The introduction has clarity in presentation of the issue. 2 Literature Review The paper gives a well broken overview of the problem and way
s to handle the issue. The research was limited to DDoS threat. 3 . 4 5 Major Impact Factors in this Work Dependent Variable Independent Variable Data Security Wireless Sensor Systems DDoS attacks Relationship Among The Above 4 Variables in This article The DDoS attacks pose a threat to data security in wireless sensor networks. Input and Output Feature of This Solution Contribution in This Work Input Output Mobile Networks Data Security The vulnerability of mobile networks to DDoS affects the functioning of the wireless systems. The findings will help develop a cost effective approach for enhancing the performance of mobile wireless networks by eliminating DDoS attacks. Analyse This Work By Critical Thinking The Tools That Assessed this Work The approach evaluates the topology of the network to identify nodes prone to DDoS attacks. Monitoring how the attacks helped to improves on the knowledge of the system and it gave insight on the recommendations adopted. The evaluation on the Quality of Protection Modeling Language, QoP-ML, helps to improve the flaws in the system. The analysis pointed that security can be improved in levels based on the target nodes, costs, and the energy consumption of the device. The research forms a basis for more study on DDoS attacks and its applicability in the Internet of Things, IoT. The Wireless Networks are prone to DDoS attacks and the research analysed cryptographic protocols, internet protocol, and the wireless protocol modelled with QoP-ML. Diagram/Flowchart The flow shows a sample of a DDoS attack model.

Leave a Reply

Your email address will not be published.