Volume 11 Number 3 September 2020


Secure and Efficient Third-party Auditing Scheme for Cloud Storage

Ghassan Sabeeh Mahmood, Dong Jun Huang, Baidaa Abdulrahman Jaleel

https://doi.org/10.6025/jisr/2020/11/3/67-74

Abstract In the cloud environment, pay-per-use is used to provide services for the end-users. With all the benefits available, a threat is present in the security of sensitive data. Users of the cloud cannot rely on cloud service providers for the security of data. In this work we present a model of cloud system that supports privacy-preserving and public auditing. The design... Read More


Trusted Execution Technology (TEE) in a Secure Execution Environment for IoT

Jawad Ali, Ahmad Sharadz Khalid, Eiad Ya, Shahrulniza Musa, Waqas Ahmed

https://doi.org/10.6025/jisr/2020/11/3/75-85

Abstract In the last couple of years, the Internet of Things (IoT) is found to have increasing applications. The IoT components include smart-devices which communicate and exchange the information without the physical intervention of humans. The growth of newer models of IoT and their systems lead the devices more vulnerable and prone to a severe kind of threats. This current study... Read More


Analyzing Throughput for Cyber-Physical Systems modeled with Synchronous Dataflow

Philippe Glanon, Selma Azaiez, Chokri Mraidha

https://doi.org/10.6025/jisr/2020/11/3/86-92

Abstract Time is the essence of the cyber-physical system which determines the efficiency of a system. While designing the Cyber Physical Systems, the performance indicator, the Throughput is used. When analyzing throughput reachable by a CPS at design-time implies to optimize the behaviour of the system in such a way that it may run with an optimal frequency. The synchronous dataflow... Read More