Responsive Event-Driven Safe and Secure Information Sharing Platform

نویسندگان

  • Hiroshi Ishii
  • Chee Onn Chow
  • Masahiro Yamamoto
  • Sakurako Horie
  • Hiroaki Nishikawa
چکیده

Recently, disasters are often striking the earth. In case of those emergency cases, information sharing infrastructure is highly required to be available with minimum security. This paper proposes a basic concept of responsive event-driven safe and secure information sharing platform to respond the above requirement. Our idea is twofold. One is the robust ad hoc network concept. When hosts and terminals may lose accessibility to the existing infrastructure after the emergency, we propose to establish wireless ad hoc network environment with information-oriented routing and route multiplication for safety. The other is the data-driven platform to support the safe and secure information sharing, which achieves efficient real-time multi-processing capability without any runtime overhead based on the passive or data-driven execution mode. By virtue of the processor, we apply it to continuous packet filtering for security and multiple job handling.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Person-Oriented Ubiquitous and Secure Information Communication Environment Supported by Data-Driven Networking Processor

This paper proposes a basic concept of person-oriented ubiquitous and secure information sharing environment. In the ubiquitous network environment, people, within a predefined restriction, can access and use information, network and computing resources wherever and whenever they are. Here, the owner of the resource and/or information is not necessarily same as the user. At the same time, the u...

متن کامل

Authorization models for secure information sharing: a survey and research agenda

This article presents a survey of authorization models and considers their 'fitness-for-purpose' in facilitating information sharing. Network-supported information sharing is an important technical capability that underpins collaboration in support of dynamic and unpredictable activities such as emergency response, national security, infrastructure protection, supply chain integration and emerg...

متن کامل

Computationally secure multiple secret sharing: models, schemes, and formal security analysis

A multi-secret sharing scheme (MSS) allows a dealer to share multiple secrets among a set of participants. in such a way a multi-secret sharing scheme (MSS) allows a dealer to share multiple secrets among a set of participants, such that any authorized subset of participants can reconstruct the secrets. Up to now, existing MSSs either require too long shares for participants to be perfect secur...

متن کامل

Unauthenticated event detection in wireless sensor networks using sensors co-coverage

Wireless Sensor Networks (WSNs) offer inherent packet redundancy since each point within the network area is covered by more than one sensor node. This phenomenon, which is known as sensors co-coverage, is used in this paper to detect unauthenticated events. Unauthenticated event broadcasting in a WSN imposes network congestion, worsens the packet loss rate, and increases the network energy con...

متن کامل

An Incentive-Aware Lightweight Secure Data Sharing Scheme for D2D Communication in 5G Cellular Networks

Due to the explosion of smart devices, data traffic over cellular networks has seen an exponential rise in recent years. This increase in mobile data traffic has caused an immediate need for offloading traffic from operators. Device-to-Device(D2D) communication is a promising solution to boost the capacity of cellular networks and alleviate the heavy burden on backhaul links. However, dir...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006