24 resultados para sicurezza IoT internet of things privacy etica
em QUB Research Portal - Research Directory and Institutional Repository for Queen's University Belfast
Resumo:
The myriad of technologies and protocols working at different layers pose significant security challenges in the upcoming Internet of Things (IoT) paradigm. Security features and needs vary from application to application and it is layer specific. In addition, security has to consider the constraints imposed by energy limited sensor nodes and consider the specific target application in order to provide security at different layers. This paper analyses current standardization efforts and protocols. It proposes a generic secured network topology for IoT and describes the relevant security challenges. Some exploitation examples are also provided.
Resumo:
With the rapid development of internet-of-things (IoT), face scrambling has been proposed for privacy protection during IoT-targeted image/video distribution. Consequently in these IoT applications, biometric verification needs to be carried out in the scrambled domain, presenting significant challenges in face recognition. Since face models become chaotic signals after scrambling/encryption, a typical solution is to utilize traditional data-driven face recognition algorithms. While chaotic pattern recognition is still a challenging task, in this paper we propose a new ensemble approach – Many-Kernel Random Discriminant Analysis (MK-RDA) to discover discriminative patterns from chaotic signals. We also incorporate a salience-aware strategy into the proposed ensemble method to handle chaotic facial patterns in the scrambled domain, where random selections of features are made on semantic components via salience modelling. In our experiments, the proposed MK-RDA was tested rigorously on three human face datasets: the ORL face dataset, the PIE face dataset and the PUBFIG wild face dataset. The experimental results successfully demonstrate that the proposed scheme can effectively handle chaotic signals and significantly improve the recognition accuracy, making our method a promising candidate for secure biometric verification in emerging IoT applications.
Resumo:
Biometric systems provide a valuable service in helping to identify individuals from their stored personal details. Unfortunately, with the rapidly increasing use of such systems, there is a growing concern about the possible misuse of that information. To counteract the threat, the European Union (EU) has introduced comprehensive legislation that seeks to regulate data collection and help strengthen an individual’s right to privacy. This article looks at the implications of the legislation for biometric system deployment. After an initial consideration of current privacy concerns, it examines what is meant by ‘personal data’ and its protection, in legislation terms. Also covered are issues around the storage of biometric data, including its accuracy, its security, and justification for what is collected. Finally, the privacy issues are illustrated through three biometric use cases: border security, online bank access control and customer profiling in stores.
Resumo:
This anthropological essay takes as its ethnographic point of departure two apparently contrasting deployments of the Bible within contemporary Scotland, one as observed among Brethren and Presbyterian fisher-families in Gamrie, coastal Aberdeenshire, and the other as observed among the Orange Order, a Protestant marching fraternity, in Airdrie and Glasgow. By examining how and with what effects the Bible and other objects (plastic crowns, ‘Sunday clothes’, Orange regalia) enter into and extend beyond the everyday practices of fishermen and Orangemen, my aim is to sketch different aspects of the material life of Scottish Protestantism. By offering a critique of Bruno Latour’s early writing on ‘quasi-objects’ via Alfred Gell’s notion of ‘distributed personhood’, I seek to undermine the sociological assumption that modernity and enchantment are mutually exclusive.
Resumo:
Major food adulteration and contamination events occur with alarming regularity and are known to be episodic, with the question being not if but when another large-scale food safety/integrity incident will occur. Indeed, the challenges of maintaining food security are now internationally recognised. The ever increasing scale and complexity of food supply networks can lead to them becoming significantly more vulnerable to fraud and contamination, and potentially dysfunctional. This can make the task of deciding which analytical methods are more suitable to collect and analyse (bio)chemical data within complex food supply chains, at targeted points of vulnerability, that much more challenging. It is evident that those working within and associated with the food industry are seeking rapid, user-friendly methods to detect food fraud and contamination, and rapid/high-throughput screening methods for the analysis of food in general. In addition to being robust and reproducible, these methods should be portable and ideally handheld and/or remote sensor devices, that can be taken to or be positioned on/at-line at points of vulnerability along complex food supply networks and require a minimum amount of background training to acquire information rich data rapidly (ergo point-and-shoot). Here we briefly discuss a range of spectrometry and spectroscopy based approaches, many of which are commercially available, as well as other methods currently under development. We discuss a future perspective of how this range of detection methods in the growing sensor portfolio, along with developments in computational and information sciences such as predictive computing and the Internet of Things, will together form systems- and technology-based approaches that significantly reduce the areas of vulnerability to food crime within food supply chains. As food fraud is a problem of systems and therefore requires systems level solutions and thinking.
Resumo:
Software-as-a-service (SaaS) is a type of software service delivery model which encompasses a broad range of business opportunities and challenges. Users and service providers are reluctant to integrate their business into SaaS due to its security concerns while at the same time they are attracted by its benefits. This article highlights SaaS utility and applicability in different environments like cloud computing, mobile cloud computing, software defined networking and Internet of things. It then embarks on the analysis of SaaS security challenges spanning across data security, application security and SaaS deployment security. A detailed review of the existing mainstream solutions to tackle the respective security issues mapping into different SaaS security challenges is presented. Finally, possible solutions or techniques which can be applied in tandem are presented for a secure SaaS platform.
Resumo:
After an open competition, we were selected to commission, curate and design the Irish pavilion for the Venice biennale 2014. Our proposal engage with the role of infrastructure and architecture in the cultural development of the new Irish state 1914-2014. This curatorial programme was realised in a demountable, open matrix pavilion measuring 12 x 5 x 6 metres.
How modernity is absorbed into national cultures usually presupposes an attachment to previous conditions and a desire to reconcile the two. In an Irish context, due to the processes of de-colonisation and political independence, this relationship is more complicated.
In 1914, Ireland was largely agricultural and lacked any significant industrial complex. The construction of new infrastructures after independence in 1921 became central to the cultural imagining of the new nation. The adoption of modernist architecture was perceived as a way to escape the colonial past. As the desire to reconcile cultural and technological aims developed, these infrastructures became both the physical manifestation and concrete identity of the new nation with architecture an essential element in this construct.
Technology and infrastructure are inherently cosmopolitan. Beginning with the Shannon hydro-electric facility at Ardnacrusha (1929) involving the German firm of Siemens-Schuckert, Ireland became a point of various intersections between imported international expertise and local need. By the turn of the last century, it had become one of the most globalised countries in the world, site of the European headquarters of multinationals such as Google and Microsoft. Climatically and economically expedient to the storing and harvesting of data, Ireland has subsequently become an important repository of digital information farmed in large, single-storey sheds absorbed into dispersed suburbs. In 2013, it became the preferred site for Intel to design and develop its new microprocessor board, the Galileo, a building block for the internet of things.
The story of the decades in between, of shifts made manifest in architecture and infrastructure, from the policies of economic protectionism to the embracing of the EU is one of the influx of technologies and cultural references into a small country on the edges of Europe: Ireland as both a launch-pad and testing ground for a series of aspects of designed modernity.
Resumo:
This paper explores the roles of science and market devices in the commodification of ‘nature’ and the configuration of flows of speculative capital. It focuses on mineral prospecting and the market for shares in ‘junior’ mining companies. In recent years these companies have expanded the reach of their exploration activities overseas, taking advantage of innovations in exploration methodologies and the liberalisation of fiscal and property regimes in ‘emerging’ mineral rich developing countries. Recent literature has explored how the reconfiguration of notions of ‘risk’ has structured the uneven distribution of rents. It is increasingly evident that neoliberal framing of environmental, political, social and economic risks has set in motion overflows that multinational mining capital had not bargained for (e.g. nationalisation, violence and political resistance). However, the role of ‘geological risk’ in animating flows of mining finance is often assumed as a ‘technical’ given. Yet geological knowledge claims, translated locally, designed to travel globally, assemble heterogeneous elements within distanciated regimes of metrology, valuation and commodity production. This paper explores how knowledge of nature is enrolled within systems of property relations, focusing on the genealogy of the knowledge practices that animate contemporary circuits of speculative mining finance. It argues that the financing of mineral prospecting mobilises pragmatic and situated forms of knowledge rather than actuarially driven calculations that promise predictability. A Canadian public enquiry struck in the wake of scandal associated with Bre-X’s prospecting activities in Indonesia is used to glean insights into the ways in which the construction of a system of public warrant to underpin financial speculation is predicated upon particular subjectivities and the outworking of everyday practices and struggles over ‘value’. Reflection on practical investments in processes of standardisation, rituals of verification and systems of accreditation reveal much about how the materiality of things shape the ways in which regional and global financial circuits are integrated, selectively transforming existing social relations and forms of knowledge production.
Resumo:
This study explores the current understanding of cross-sectoral collaboration between schools in a divided society. The paper provides the context surrounding inter-school collaboration in Northern Ireland then presents findings based on a qualitative study of five post-primary partnerships made up of schools from the various sectors in Northern Ireland (maintained/Catholic, controlled/Protestant and integrated sectors). Participants in the study are teachers and school leaders. Evidence from this study reveals a number of things: despite a separate education system made up of different sectors, schools on an inter-sectoral basis are willing to collaborate and those represented in this study appeared disposed to sustain partnership activities; schools recognised that collaboration and partnership while beset with a number of logistical challenges, is also beneficial for pupils and institutions. In all cases there remained evidence of sustainable collaborative practice; although some of this was more developed in some partnerships than in others. In effect this paper concludes by recognising that schools do require some level of funding to sustain partnership working but that sustainability should not be couched entirely around these terms; rather, sustainability is about creating the right conditions to allow schools to develop effective and strong partnerships. These conditions are outlined in the latter stages of this paper.
Resumo:
While video surveillance systems have become ubiquitous in our daily lives, they have introduced concerns over privacy invasion. Recent research to address these privacy issues includes a focus on privacy region protection, whereby existing video scrambling techniques are applied to specific regions of interest (ROI) in a video while the background is left unchanged. Most previous work in this area has only focussed on encrypting the sign bits of nonzero coefficients in the privacy region, which produces a relatively weak scrambling effect. In this paper, to enhance the scrambling effect for privacy protection, it is proposed to encrypt the intra prediction modes (IPM) in addition to the sign bits of nonzero coefficients (SNC) within the privacy region. A major issue with utilising encryption of IPM is that drift error is introduced outside the region of interest. Therefore, a re-encoding method, which is integrated with the encryption of IPM, is also proposed to remove drift error. Compared with a previous technique that uses encryption of IPM, the proposed re-encoding method offers savings in the bitrate overhead while completely removing the drift error. Experimental results and analysis based on H.264/AVC were carried out to verify the effectiveness of the proposed methods. In addition, a spiral binary mask mechanism is proposed that can reduce the bitrate overhead incurred by flagging the position of the privacy region. A definition of the syntax structure for the spiral binary mask is given. As a result of the proposed techniques, the privacy regions in a video sequence can be effectively protected by the enhanced scrambling effect with no drift error and a lower bitrate overhead.
Resumo:
We live in a richly structured auditory environment. From the sounds of cars charging towards us on the street to the sounds of music filling a dancehall, sounds like these are generally seen as being instances of things we hear but can also be understood as opportunities for action. In some circumstances, the sound of a car approaching towards us can provide critical information for the avoidance of harm. In the context of a concert venue, sociocultural practices like music can equally afford coordinated activities of movement, such as dancing or music making. Despite how evident the behavioral effects of sound are in our everyday experience, they have been sparsely accounted for within the field of psychology. Instead, most theories of auditory perception have been more concerned with understanding how sounds are passively processed and represented or how they convey information of world, neglecting how this information can be used for anything. Here, we argue against these previous rationalizations, suggesting instead that information is instantiated through use and, therefore, is an emergent effect of a perceiver’s interaction with their environment. Drawing on theory from psychology, philosophy and anthropology, we contend that by thinking of sounds as materials, theorists and researchers alike can get to grips with the vast array of auditory affordances that we purposefully bring into use when interacting with the environment.