scispace - formally typeset
Search or ask a question
Author

Tanvi Garg

Bio: Tanvi Garg is an academic researcher. The author has contributed to research in topics: Privacy policy & The Internet. The author has an hindex of 1, co-authored 3 publications receiving 18 citations.

Papers
More filters
Journal ArticleDOI
TL;DR: The issues faced in implementing a secure IoV architecture are discussed and the various challenges in implementing security and privacy in IoV are examined by reviewing past papers along with pointing out research gaps and possible future work and putting forth on inferences relating to each paper.
Abstract: As an up-and-coming branch of the internet of things, internet of vehicles (IoV) is imagined to fill in as a fundamental information detecting and processing platform for astute transportation frameworks. Today, vehicles are progressively being associated with the internet of things which empower them to give pervasive access to data to drivers and travelers while moving. Be that as it may, as the quantity of associated vehicles continues expanding, new prerequisites, (for example, consistent, secure, vigorous, versatile data trade among vehicles, people, and side of the road frameworks) of vehicular systems are developing. Right now, the unique idea of vehicular specially appointed systems is being changed into another idea called the internet of vehicles (IoV). We talk about the issues faced in implementing a secure IoV architecture. We examine the various challenges in implementing security and privacy in IoV by reviewing past papers along with pointing out research gaps and possible future work and putting forth our on inferences relating to each paper.

30 citations

Journal ArticleDOI
TL;DR: The paper discusses the proposed architecture, describes the algorithm used to tag health-care data, analyzes the metrics of the anonymized data against various attacks and devises a mathematical model for role-based access control.
Abstract: Purpose This paper aims to design a secure and seamless system that ensures quick sharing of health-care data to improve the privacy of sensitive health-care data, the efficiency of health-care infrastructure, effective treatment given to patients and encourage the development of new health-care technologies by researchers. These objectives are achieved through the proposed system, a “privacy-aware data tagging system using role-based access control for health-care data.” Design/methodology/approach Health-care data must be stored and shared in such a manner that the privacy of the patient is maintained. The method proposed, uses data tags to classify health-care data into various color codes which signify the sensitivity of data. It makes use of the ARX tool to anonymize raw health-care data and uses role-based access control as a means of ensuring only authenticated persons can access the data. Findings The system integrates the tagging and anonymizing of health-care data coupled with robust access control policies into one architecture. The paper discusses the proposed architecture, describes the algorithm used to tag health-care data, analyzes the metrics of the anonymized data against various attacks and devises a mathematical model for role-based access control. Originality/value The paper integrates three disparate topics – data tagging, anonymization and role-based access policies into one seamless architecture. Codifying health-care data into different tags based on International Classification of Diseases 10th Revision (ICD-10) codes and applying varying levels of anonymization for each data tag along with role-based access policies is unique to the system and also ensures the usability of data for research.

1 citations

Proceedings ArticleDOI
31 Oct 2022
TL;DR: Digital control tower as discussed by the authors leverages Artificial intelligence, Machine learning and blockchain technologies to seamlessly capture, maintain and process fragmented data set into intelligent predictive analytics which helps the project stakeholders to take right decision on right time, so as to avoid any kind of delays in project.
Abstract: Cloud based end to end digital project management platform with digital control tower, as fundamental technologies of the fourth industrial revolution, have enormous potential to improve real time visibility, productivity, collaboration, data sharing, efficiency, predictability, decision power and sustainability in the construction industry. Throughout the lifecycle of capital / mega projects, the engineering, construction, operations, and maintenance stakeholders face numerous issues, including the lack of trust and visibility, inefficiencies, and the fragmentation of the information value chain into fragile data silos. Digital control tower aimed to narrow down the time, budget and quality & safety challenges of a capital project by having overall / end to end control of project from initiation phase to handover and operations phase of the project. Digital control tower provides systematic, 360-degree view of project details along with real-time analytics spanning from design engineering, pre-construction planning, onsite execution, action tracker, construction services, equipment's, quality, budget and safety (leading and lagging indicators). Stakeholders involved throughout the project lifecycle (i.e.: owner, engineering team, pre-construction and planning team, construction management and site team), enables instantaneous connectivity from the top floor to the shop floor for seamless communication by reducing waste time. Digital control tower also enables bird's eye view for real time project performance monitoring and progress, it also enables week wise look ahead task for better monitoring and control, also narrows down the issues or concerns to an activity, area or person. The control tower can create the customizable necessary discipline/function dashboards available to all relevant roles and stakeholders without limitation. Digital Control Tower leverages Artificial intelligence, Machine learning and Blockchain technologies to seamlessly capture, maintain and process fragmented data set into intelligent predictive analytics which helps the project stakeholders to take right decision on right time, so as to avoid any kind of delays in project. Digital Control Tower is not a standard dashboard, it's an integrated digital ecosystem where stakeholders can drive projects with real time data for decision making.

Cited by
More filters
Journal Article
TL;DR: Calculations are developed and examined to reduce the entire quantity of Wireless access points as well as their locations in almost any given atmosphere while with the throughput needs and the necessity to ensure every place in the area can achieve a minimum of k APs.
Abstract: More particularly, calculations are developed and examined to reduce the entire quantity of Wireless access points as well as their locations in almost any given atmosphere while with the throughput needs and the necessity to ensure every place in the area can achieve a minimum of k APs. This paper concentrates on using Wireless for interacting with and localizing the robot. We've carried out thorough studies of Wireless signal propagation qualities both in indoor and outside conditions, which forms the foundation for Wireless AP deployment and communication to be able to augment how human operators communicate with this atmosphere, a mobile automatic platform is developed. Gas and oil refineries could be a harmful atmosphere for various reasons, including heat, toxic gasses, and unpredicted catastrophic failures. When multiple Wireless APs are close together, there's a possible for interference. A graph-coloring heuristic can be used to find out AP funnel allocation. Additionally, Wireless fingerprinting based localization is developed. All of the calculations implemented are examined in real life situations using the robot developed and answers are promising. For example, within the gas and oil industry, during inspection, maintenance, or repair of facilities inside a refinery, people might be uncovered to seriously high temps to have a long time, to toxic gasses including methane and H2S, and also to unpredicted catastrophic failures.

455 citations

Journal ArticleDOI
TL;DR: This article provides a comprehensive survey of research efforts to secure the industrial Internet of Things, discusses their applicability, and analyzes their security benefits.
Abstract: Given the tremendous success of the Internet of Things in interconnecting consumer devices, we observe a natural trend to likewise interconnect devices in industrial settings, referred to as industrial Internet of Things or Industry 4.0. While this coupling of industrial components provides many benefits, it also introduces serious security challenges. Although sharing many similarities with the consumer Internet of Things, securing the industrial Internet of Things introduces its own challenges but also opportunities, mainly resulting from a longer lifetime of components and a larger scale of networks. In this article, we identify the unique security goals and challenges of the industrial Internet of Things, which, unlike consumer deployments, mainly follow from safety and productivity requirements. To address these security goals and challenges, we provide a comprehensive survey of research efforts to secure the industrial Internet of Things, discuss their applicability, and analyze their security benefits.

107 citations

Journal ArticleDOI
TL;DR: This survey investigates the major research efforts over the period of 2013–2019 that address IoT security and privacy issues and provides extensive discussions on securing cloud-based IoT solutions, which include access control, integrity, and authentication.
Abstract: Since the term first coined in 1999, the Internet of Things (IoT) has gained significant momentum in connecting physical objects to the Internet and facilitating machine-to-human and machine-to-machine communications. By offering the capability to connect and integrate both digital and physical entities, IoT becomes an important paradigm that enables a whole new class of applications and services. Security is one of the most challenging issues that need to be addressed before these IoT applications and services can be fully embraced. In this survey, we investigate the major research efforts over the period of 2013–2019 that address IoT security and privacy issues. We provide extensive discussions on securing cloud-based IoT solutions. The main focus of these discussions is on securing the information in transit between IoT devices and IoT applications, where most of the data processing and modelling tasks take place. These discussions include all security aspects and challenges facing the data in transit. Specifically, a number of common attacks that target IoT solutions are first discussed, while presenting the main challenges of IoT security (e.g., the resource limitation of IoT devices, which hinder the ability of such devices to do expensive computations for securing the data). Then we present the main security requirements needed by IoT systems, which include access control, integrity, and authentication. We review recent research work in providing security and privacy services, which delegate the expensive computations to an edge or cloud, to cope with the low computations restrictions in IoT devices. Open research issues and possible research directions in securing cloud-based IoT systems are discussed, while proposing some possible solutions.

66 citations

Journal ArticleDOI
TL;DR: The extent to which some data categories have been used with ML-based solutions to preserve privacy and proposed novel opportunities for ML- based solutions to leverage these data sources in the IoT ecosystem are examined.

39 citations

Journal ArticleDOI
TL;DR: In this paper, the applicability of blockchain-based self-sovereign identity (SSI) solution in healthcare, their advantages and requirements, and a model use case for demonstrating the SSI application in healthcare.

38 citations