The rapid expansion of smart cities has led to the widespread deployment of Internet of Things (IoT) devices for real-time data collection and urban optimization. However, these interconnected systems face critical cybersecurity risks, including data tampering, unauthorized access, and privacy breaches. This paper proposes a blockchain-based framework designed to enhance the security, integrity, and resilience of IoT data in smart city environments. Leveraging a private blockchain, the system ensures decentralized, tamper-proof data storage, and transaction verification through digital signatures and a lightweight Proof of Work consensus mechanism. Smart contracts are employed to automate access control and respond to anomalies in real time. A Python-based simulation demonstrates the framework’s effectiveness in securing IoT communications. The system supports rapid transaction validation with minimal latency and enables timely detection of anomalous patterns through integrated machine learning. Evaluations show that the framework maintains consistent performance across diverse smart city components such as transportation, healthcare, and building security. These results highlight the potential of the proposed solution to enable secure, scalable, and real-time IoT ecosystems for modern urban infrastructures.
The usage of cybersecurity is growing steadily because it is beneficial to us. When people use cybersecurity, they can easily protect their valuable data. Today, everyone is connected through the internet. It’s much easier for a thief to connect important data through cyber-attacks. Everyone needs cybersecurity to protect their precious personal data and sustainable infrastructure development in data science. However, systems protecting our data using the existing cybersecurity systems is difficult. There are different types of cybersecurity threats. It can be phishing, malware, ransomware, and so on. To prevent these attacks, people need advanced cybersecurity systems. Many software helps to prevent cyber-attacks. However, these are not able to early detect suspicious internet threat exchanges. This research used machine learning models in cybersecurity to enhance threat detection. Reducing cyberattacks internet and enhancing data protection; this system makes it possible to browse anywhere through the internet securely. The Kaggle dataset was collected to build technology to detect untrustworthy online threat exchanges early. To obtain better results and accuracy, a few pre-processing approaches were applied. Feature engineering is applied to the dataset to improve the quality of data. Ultimately, the random forest, gradient boosting, XGBoost, and Light GBM were used to achieve our goal. Random forest obtained 96% accuracy, which is the best and helpful to get a good outcome for the social development in the cybersecurity system.
This study aims to use dialectical thinking to explore the impacts and responses of Artificial Intelligence (AI) empowerment on students’ personalized learning. The effect of AI empowerment on student personalization is dissected through a literature review and empirical cases. The study finds that AI plays a significant role in promoting personalized learning by enhancing students’ learning effectiveness through intelligent recommendation, automated feedback, improving students’ independent learning ability, and optimizing learning paths, however, the wide application of AI also brings problems such as technological dependence, cheating in exams, weakening of critical thinking ability, educational fairness, and data privacy protection to students. The study proposes recommendations to strengthen technology regulation, enhance the synergy between teachers and AI, and optimize the personalized learning model. AI-enabled personalized learning is expected to play a greater role in improving learning efficiency and educational fairness.
Personal information is a vital productive commodity in the digital economy, and its processing has seen unparalleled transformations in both breadth and depth. This article proposes to enhance the legal remedies for personal information rights in contemporary China. Research has revealed multiple practical challenges in China’s judicial practices, such as hesitance to prosecute owing to an absence of substantial legal foundation, improper distribution of the burden of proof, and inadequate integration of criminal-civil judicial safeguards for personal information. This paper advocates for China to elucidate the definition of personal information rights via legislation, enable the litigation of personal information infringement cases, and establish explicit criteria for their acceptance into judicial proceedings. Furthermore, China must develop an appropriate structure for distributing the burden of evidence. It must also use discretionary judgment to properly tackle the problems related to evaluating damages in instances of personal information violations.
The privacy of personal information is aimed at protecting human rights both under the international human rights regime and the Saudi Arabian constitution and other statutes and regulations, subject only to some exceptions that include the protection of public health. The coronavirus disease 2019 (COVID-19) pandemic has brought about certain challenges that necessitate strategies to augment the conventional surveillance of infectious diseases, contact tracing, isolation, reporting and vaccination. Several governments institutions, and agencies presently adopt mobile applications for collecting, analyzing, managing, and sharing critical personal data of individuals infected with or exposed to COVID-19. While the benefits of sharing private information for achieving public health needs may not be disputed, the risk of breach of personal privacy is enormous. This had forced the national governments into a dilemma of either succumbing to public health needs, strictly respecting and protecting the privacy of individuals, or alternatively, balancing the two conflicting demands. There is a massive body of literature on the security and privacy of such mobile applications, but none has adequately explored and discussed public interest justifications under Saudi Arabian laws for alleged privacy breaches. We examined the health surveillance mobile app technologies currently in use in Saudi Arabia with the aim of determining the potential risks of data breaches under extant data protection laws. The paper recommends, among others, that any potential risk of breach to right to privacy of personal information under the law must be (justified by) the public health needs to protect society during the COVID-19 pandemic.
A smart city focuses on enhancing and interconnecting facilities and services through digital technology to offer convenient services for both people and businesses. The basic infrastructure of smart cities consists of modern technologies such as the Internet of Things (IoT), cloud computing and artificial intelligence. These urban areas utilize different networks, such as the Internet and IoT, to share real-time information, improving convenience for the inhabitants. However, the reliance of smart cities on modern technologies exposes them to a range of organized, diverse, and sophisticated cyber threats. Therefore, prioritizing cybersecurity awareness and implementing appropriate measures and solutions are essential to protect the privacy and security of citizens. This study aims to identify cyber threats and their impact on smart cities, as well as the methods and measures required for key areas such as smart government, smart healthcare, smart mobility, smart environment, smart economy, smart living, and smart people. Furthermore, this study seeks to evaluate previous research in this field, establish necessary policies to mitigate these threats, and propose an appropriate model for the infrastructure associated with IT networks in smart cities.
Copyright © by EnPress Publisher. All rights reserved.