Cloud computing brings convenience to the users by providing computational resources and services. However, it comes with security challenges, such as unreliable cloud service providers that could ...threaten users’ data integrity. Therefore, we need a data verification protocol to ensure users’ data remains intact in the cloud storage. The data verification protocol has three important properties: public verifiability, privacy preservation, and blockless verification. Unfortunately, various existing signcryption schemes do not fully provide those important properties. As a result, we propose an improved version of a signcryption technique based on the short signature ZSS that can fulfill the aforementioned data verification important properties. Our computational cost and time complexity assessment demonstrates that our suggested scheme can offer more characteristics at the same computational cost as another ZSS signcryption scheme.
This study evaluated the relationship of insulin resistance (IR) and glycemic control status to the presence and severity of coronary artery disease (CAD) according to diabetes. The relationship of ...IR parameters including homeostatic model assessment of IR (HOMA-IR), triglyceride-glucose (TyG) index, and triglyceride-to-high density lipoprotein cholesterol ratio (TG/HDL), and hemoglobin A1C (HbA1C) level to CAD and obstructive CAD was evaluated in 5,764 asymptomatic subjects who underwent coronary computed tomographic angiography. Non-diabetics (n = 4768) and diabetics (n = 996) were stratified into four groups based on the quartiles of HOMA-IR and the TyG index and were grouped based on the TG/HDL cut-offs of 3.5, respectively. CAD and obstructive CAD were defined as the presence of any plaques and plaques with ≥50% stenosis, respectively. The prevalence of CAD (59.0% vs. 39.0%) and obstructive CAD (15.0% vs. 6.6%) was higher in diabetic than in non-diabetic patients (p < 0.001, respectively). In non-diabetic patients, the adjusted odds ratio for both CAD and obstructive CAD significantly increased, but only with higher TyG index quartiles. Unlike non-diabetics, the adjusted odds ratio for obstructive CAD significantly increased in diabetic patients with a TG/HDL level ≥ 3.5. The HbA1C, rather than IR parameters, was independently associated with both CAD and obstructive CAD in diabetics. In conclusion, among IR parameters, TyG index was independently associated with the presence of CAD and obstructive CAD in non-diabetic patients. In contrast, the glycemic control status, rather than IR, was importantly related to both CAD and obstructive CAD in established diabetic patients.
Internet of Things is a ubiquitous concept where physical objects are connected over the internet and are provided with unique identifiers to enable their self-identification to other devices and the ...ability to continuously generate data and transmit it over a network. Hence, the security of the network, data and sensor devices is a paramount concern in the IoT network as it grows very fast in terms of exchanged data and interconnected sensor nodes. This paper analyses the authentication and access control method using in the Internet of Things presented by Jing et al. (Authentication and Access Control in the Internet of Things. In Proceedings of the 2012 32nd International Conference on Distributed Computing Systems Workshops, Macau, China, 18-21 June 2012, pp. 588-592). According to our analysis, Jing et al.'s protocol is costly in the message exchange and the security assessment is not strong enough for such a protocol. Therefore, we propose improvements to the protocol to fill the discovered weakness gaps. The protocol enhancements facilitate many services to the users such as user anonymity, mutual authentication, and secure session key establishment. Finally, the performance and security analysis show that the improved protocol possesses many advantages against popular attacks, and achieves better efficiency at low communication cost.
AI has been implemented in many sectors such as security, health, finance, national defense, etc. However, together with AI’s groundbreaking improvement, some people exploit AI to do harmful things. ...In parallel, there is rapid development in cloud computing technology, introducing a cloud-based AI system. Unfortunately, the vulnerabilities in cloud computing will also affect the security of AI services. We observe that compromising the training data integrity means compromising the results in the AI system itself. From this background, we argue that it is essential to keep the data integrity in AI systems. To achieve our goal, we build a data integrity architecture by following the National Institute of Standards and Technology (NIST) cybersecurity framework guidance. We also utilize blockchain technology and smart contracts as a suitable solution to overcome the integrity issue because of its shared and decentralized ledger. Smart contracts are used to automate policy enforcement, keep track of data integrity, and prevent data forgery. First, we analyze the possible vulnerabilities and attacks in AI and cloud environments. Then we draw out our architecture requirements. The final result is that we present five modules in our proposed architecture that fulfilled NIST framework guidance to ensure continuous data integrity provisioning towards secure AI environments.
The evolution of the internet has led to the growth of smart application requirements on the go in the vehicular ad hoc network (VANET). VANET enables vehicles to communicate smartly among themselves ...wirelessly. Increasing usage of wireless technology induces many security vulnerabilities. Therefore, effective security and authentication mechanism is needed to prevent an intruder. However, authentication may breach user privacy such as location or identity. Cryptography-based approach aids in preserving the privacy of the user. However, the existing security models incur communication and key management overhead since they are designed considering a third-party server. To overcome the research issue, this work presents an efficient security model namely secure performance enriched channel allocation (S−PECA) by using commutative RSA. This work further presents the commutative property of the proposed security scheme. Experiments conducted to evaluate the performance of the proposed S−PECA over state-of-the-art models show significant improvement. The outcome shows that S−PECA minimizes collision and maximizes system throughput considering different radio propagation environments.
The Hsp70-binding protein 1 (HspBP1) belongs to a family of co-chaperones that regulate Hsp70 activity and whose biological significance is not well understood. In the present study, we show that ...when HspBP1 is either knocked down or overexpressed in BRCA1-proficient breast cancer cells, there were profound changes in tumorigenesis, including anchorage-independent cell growth in vitro and in tumor formation in xenograft models. However, HspBP1 did not affect tumorigenic properties in BRCA1-deficient breast cancer cells. The mechanisms underlying HspBP1-induced tumor suppression were found to include interactions with BRCA1 and promotion of BRCA1-mediated homologous recombination DNA repair, suggesting that HspBP1 contributes to the suppression of breast cancer by regulating BRCA1 function and thereby maintaining genomic stability. Interestingly, independent of BRCA1 status, HspBP1 facilitates cell survival in response to ionizing radiation (IR) by interfering with the association of Hsp70 and apoptotic protease-activating factor-1. These findings suggest that decreased HspBP1 expression, a common occurrence in high-grade and metastatic breast cancers, leads to genomic instability and enables resistance to IR treatment.
BACKGROUND:Owing to the differential propensity for bleeding and ischemic events with response to antiplatelet therapy, the safety and effectiveness of potent P2Y12 inhibitor ticagrelor in East Asian ...populations remain uncertain.
METHODS:In this multicenter trial, 800 Korean patients hospitalized for acute coronary syndromes with or without ST elevation and intended for invasive management were randomly assigned to receive, in a 1:1 ratio, ticagrelor (180 mg loading dose, 90 mg twice daily thereafter) or clopidogrel (600 mg loading dose, 75 mg daily thereafter). The primary safety outcome was clinically significant bleeding (a composite of major bleeding or minor bleeding according to PLATO (Platelet Inhibition and Patient Outcomes) criteria at 12 months.
RESULTS:At 12 months, the incidence of clinically significant bleeding was significantly higher in the ticagrelor group than in the clopidogrel group (11.7% 45/400 vs 5.3% 21/400; hazard ratio HR, 2.26; 95% confidence interval CI, 1.34 to 3.79; P=0.002). The incidences of major bleeding (7.5% 29/400 vs 4.1% 16/400, P=0.04) and fatal bleeding (1% 4/400 vs 0%, P=0.04) were also higher in the ticagrelor group. The incidence of death from cardiovascular causes, myocardial infarction, or stroke was not significantly different between the ticagrelor group and the clopidogrel group (9.2% 36/400 vs 5.8% 23/400; HR, 1.62; 95% CI, 0.96 to 2.74; P=0.07). Overall safety and effectiveness findings were similar with the use of several different analytic methods and in multiple subgroups.
CONCLUSIONS:In Korean acute coronary syndrome patients intended to receive early invasive management, standard-dose ticagrelor as compared with clopidogrel was associated with a higher incidence of clinically significant bleeding. The numerically higher incidence of ischemic events should be interpreted with caution, given the present trial was underpowered to draw any conclusion regarding efficacy.
CLINICAL TRIAL REGISTRATION:URLhttps://www.clinicaltrials.gov. Unique identifierNCT02094963.
In a previous randomized trial, we found that percutaneous coronary intervention (PCI) was not inferior to coronary artery bypass grafting (CABG) for the treatment of unprotected left main coronary ...artery stenosis at 1 year.
This study sought to determine the 5-year outcomes of PCI compared with CABG for the treatment of unprotected left main coronary artery stenosis.
We randomly assigned 600 patients with unprotected left main coronary artery stenosis to undergo PCI with a sirolimus-eluting stent (n = 300) or CABG (n = 300). The primary endpoint was a major adverse cardiac or cerebrovascular event (MACCE: a composite of death from any cause, myocardial infarction, stroke, or ischemia-driven target vessel revascularization) and compared on an intention-to-treat basis.
At 5 years, MACCE occurred in 52 patients in the PCI group and 42 patients in the CABG group (cumulative event rates of 17.5% and 14.3%, respectively; hazard ratio HR: 1.27; 95% confidence interval CI: 0.84 to 1.90; p = 0.26). The 2 groups did not differ significantly in terms of death from any cause, myocardial infarction, or stroke as well as their composite (8.4% and 9.6%; HR, 0.89; 95% CI, 0.52 to 1.52; p = 0.66). Ischemia-driven target vessel revascularization occurred more frequently in the PCI group than in the CABG group (11.4% and 5.5%, respectively; HR: 2.11; 95% CI: 1.16 to 3.84; p = 0.012).
During 5 years of follow-up, our study did not show significant difference regarding the rate of MACCE between patients who underwent PCI with a sirolimus-eluting stent and those who underwent CABG. However, considering the limited power of our study, our results should be interpreted with caution. (Bypass Surgery Versus Angioplasty Using Sirolimus-Eluting Stent in Patients With Left Main Coronary Artery Disease PRECOMBAT; NCT00422968).
Cybercriminals use malicious URLs as distribution channels to propagate malware over the web. Attackers exploit vulnerabilities in browsers to install malware to have access to the victim's computer ...remotely. The purpose of most malware is to gain access to a network, ex-filtrate sensitive information, and secretly monitor targeted computer systems. In this paper, a data mining approach known as classification based on association (CBA) to detect malicious URLs using URL and webpage content features is presented. The CBA algorithm uses a training dataset of URLs as historical data to discover association rules to build an accurate classifier. The experimental results show that CBA gives comparable performance against benchmark classification algorithms, achieving 95.8% accuracy with low false positive and negative rates.
A quantitative driving mechanism of the spontaneous plasma rotation is analyzed by the plasma collisions with the neutrals. The origin of the plasma rotation on fusion devices without external ...momentum input has been an intensive research subject for more than two decades and no quantitative explanation is available so far. This new intrinsic rotation analysis finds that there is an unbalanced electrical force exchange between the ion and the electron induced by the ion-neutral charge exchange reactions. The electrons give most of the electrical force induced by the toroidal E-field to the ions, but the ions give a significant part of the electrical force to the neutrals. This unbalanced force generates toroidal rotation of ions in a counter-current direction. The rotation magnitude is determined by the frequencies of collisions between plasma and neutrals. A calculation method for the intrinsic rotation based on the measured parameters and simulated unknown parameters is established. The evolution of calculated intrinsic rotation by this method is well agreed with the experimental measurement on KSTAR. It is also found that the most determinant parameter for the intrinsic rotation is the impurity concentration and the variation by the neutral density change is relatively small.
Display omitted
•An analysis is established on the origin of tokamak intrinsic rotation based on the ion-neutral charge exchange reactions.•This analysis is compared with KSTAR experimental results, which agree well on the early counter-current intrinsic rotation.•This intrinsic rotation induced by neutral is less dependent on the neutral density and more on the impurity concentration.•This analysis is the first one that quantitatively agrees with the experimental observations.