Welcome to IOTCB 2024

3rd International Conference on IOT, Cloud and Big Data (IOTCB 2024)

July 13 ~ 14, 2024, Virtual Conference



Accepted Papers
Security Concerns in IOT Light Bulbs: Investigating Covert Channels

Janvi Panwar Ravisha Rohilla

ABSTRACT

The proliferation of Internet of Things (IoT) devices has raised significant concerns regarding their security vulnerabilities. This paper explores the security risks associated with smart light systems, focusing on covert communication channels. Drawing upon previous research highlighting vulnerabilities in communication protocols and encryption flaws, the study investigates the potential for exploiting smart light systems for covert data transmission. Specifically, the paper replicates and analyzes an attack method introduced by Ronen and Shamir, which utilizes the Philips Hue White lighting system to create a covert channel through visible light communication (VLC). Experimental results demonstrate the feasibility of transmitting data covertly through subtle variations in brightness levels, leveraging the inherent functionality of smart light bulbs. Despite limitations imposed by device constraints and communication protocols, the study underscores the need for heightened awareness and security measures in IoT environments. Ultimately, the findings emphasize the importance of implementing robust security practices and exercising caution when deploying networked IoT devices in sensitive environments.


Internet of Things: Domesticated Toolsets for Solving Major Challenges Faced by Individuals With Health Problems

Tunbosun Oyewale Oladoyinbo1 and Isiaka Akinkunmi Adeyemo2, 1University of Maryland Global Campus, Maryland, United States of America, 2Ladoke Akintola University of Technology, Ogbomoso Oyo State, Nigeri

ABSTRACT

In this modern era of globalization, technology has increasingly infiltrated all aspects of human life. Health is no exception to this advance. Provision of health services has undergone evolution to reach the current status. However, many people, especially in developing countries, do not enjoy optimum health services due to several constraints. This is where technology continues to grow and be beneficial for all strata of society. From the direct provision of health services, technology can also help to prevent, optimize diagnosis, and treatment of diseases. One of the latest breakthroughs in health service provision is the integration of the Internet of Things (IoT). Utilization of IoT is expected to bring a radical change to the provision of health services. This is in line with the principle approach of preventive, predictive, and personalized that so far has not been applied optimally due to limitations and constraints of health resources.

Keywords

Globalization, internet of things, health, quality of life, chronic conditions, companion devices, wearable devices.


Forecasting Network Capacity for Global Enterprise Backbone Networks using Machine Learning Techniques

Kapil Patil and Bhavin Desai

ABSTRACT

This paper presents a machine learning approach to forecasting network capacity for global enterpriselevel backbone networks. By leveraging historical traffic data, we develop a predictive model that accurately forecasts future demands. The effectiveness of our approach is validated through rigorous testing against established benchmarks, demonstrating significant improvements in forecasting accuracy.

KEYWORDS

Network capacity forecasting, Machine learning, Time series forecasting, ARIMA, Predictive modelling & Capacity Planning.


The Toe Theory and Cloud Computing: Exploring Factors Affecting the Adoption of Cloud Computing

Tunbosun Oyewale Oladoyinbo1, Isiaka Akinkunmi Adeyemo2 Oluseun Babatunde Oladoyinbo3, 1University of Maryland Global Campus, Maryland, United States of America, 2Ladoke Akintola University of Technology, Ogbomoso Oyo State, Nigeri, 3Oyo state College of Agriculture Igboora Oyo State Nigeria

ABSTRACT

This study investigates the elements anticipated to affect healthcare hospitals' decision to use cloud computing. A quantitative technique is applied in this work. To find out how prepared and able the IT departments of various hospitals were to embrace cloud computing, 200 questionnaires were utilised. The decision of organisations to view cloud computing as a wise investment was influenced by Technology, Organisational, and Environmental aspects (TOE), as determined by multiple regression testing of the data. The study's results revealed that every element significantly improved hospitals' intention to use cloud computing, with the technological element having the biggest influence on the choice.

KEYWORDS

organizations, adapt, global market, efficiency, IT industry, cloud computing, investment, environment, technological advancements.


Empowering Healthcare: a Blockchain-based Secure and Decentralized Data Sharing Scheme With Searchable Encryption

Seyed mohammad and Sajad Meisam, Worcester Polytechnic Institute, United States of America

ABSTRACT

Medical care is one of the most important parts of human lives, and now with the invention of the internet of things(IOT) and cloud computing streamlining the treatment process is becoming a main topic of research. The problem is the sensitivity of the medical data which raises concerns about data privacy in the system. storing vast amount of patients’ data in the cloud which is controlled by a single trusted third party is common nowadays but, this manner poses great privacy risks and security concerns because it makes it possible for the cloud to use the stored data for illegal purposes. In this paper we try to answer this question that ’how to resolve these problems using the blockchain technology?’. we propose a novel protocol that combines Blockchain technology and cryptographic primitives such as ring signature and searchable encryption in order to remove the need for a trusted third party and providing an efficient privacy preserving access control mechanism. Also when it comes to the applications of the blockchains in areas other than cryptocurrencies, combining this technology to other cryptographic primitives can lead to unique features. In this paper we used ring signatures in order to protect the patients’ privacy and also by using the blockchain technology we were able to eliminate the need for a trusted third party and provide security for a searchable encryption scheme.

KEYWORDS

Blockcchain, IOT, privacy, cryptography, searchable encryption.