Journal articles on the topic 'Data security and protection'

To see the other types of publications on this topic, follow the link: Data security and protection.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Data security and protection.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Carey, Peter, and David Berry. "DATA PROTECTION — SECURITY." Computer Law & Security Review 18, no. 2 (March 2002): 112–13. http://dx.doi.org/10.1016/s0267-3649(02)03010-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Begum, Shameena, V. Ratna Vasuki, and K. V. V. Srinivas K.V.V.Srinivas. "Data Security and Protection in Cloud Computing." International Journal of Scientific Research 1, no. 2 (June 1, 2012): 31–34. http://dx.doi.org/10.15373/22778179/jul2012/9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

MALIK, MAREK. "Data Protection and Security." Pacing and Clinical Electrophysiology 17, no. 2 (February 1994): 240–41. http://dx.doi.org/10.1111/j.1540-8159.1994.tb01376.x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Qureshi, Anique A., and Joel G. Siegel. "Information security and data protection." International Journal of Computer Applications in Technology 14, no. 1/2/3 (2001): 1. http://dx.doi.org/10.1504/ijcat.2001.000256.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Martín del Rey, A., J. L. Hernández Pastora, and G. Rodríguez Sánchez. "3D medical data security protection." Expert Systems with Applications 54 (July 2016): 379–86. http://dx.doi.org/10.1016/j.eswa.2016.02.001.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Highland, Harold Joseph. "Microcomputer security: Data protection techniques." Computers & Security 4, no. 2 (June 1985): 123–34. http://dx.doi.org/10.1016/0167-4048(85)90016-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Fang, Ze Nan, Jian Ming Zhou, and Jing Song Zhang. "A Practical Data Security Protection Technology." Advanced Materials Research 846-847 (November 2013): 1620–23. http://dx.doi.org/10.4028/www.scientific.net/amr.846-847.1620.

Full text
Abstract:
While the flash becomes main data storage medium, user authentication is normally used as the most important method to safeguard the securities of the data. But ii could do nothing to prevent illegal copies of legitimate users and illegal hard copies. This paper introduces a new type of data security protection technology. A method of generating special character code was first proposed. The code is regarded as the flash identity. The authentication of that identity can be applied to effectively recognize the illegal data copies and protect the data security.
APA, Harvard, Vancouver, ISO, and other styles
8

Bolshakov, A. S., A. I. Zhila, and A. V. Osin. "FUZZY LOGIC DATA PROTECTION MANAGEMENT." H&ES Research 13, no. 4 (2021): 37–47. http://dx.doi.org/10.36724/2409-5419-2021-13-4-37-47.

Full text
Abstract:
Introduction: to ensure the necessary level of personal data security in computer systems, it is advisable to create an information security management system that would allow you to help choose protective measures for certain input data. Purpose: to develop an algorithm for the personal data protection model that allows considering a set of input factors for making decisions on information security. Methods: it is proposed to use the fuzzy inference apparatus as a mathematical apparatus for describing such a situation. The main advantage of using this mathematical approach in modeling a control system is the description of conditions and methods for solving problems under uncertainty. Results: when building an information security management system, defined a set of rules and study the influence of changes in input variables on a set of protective measures. The model developed on the basis of this algorithm using fuzzy inference identifies the impact of information security threats on decision-making on the choice of measures to protect personal data in a computer system. The result of threat modeling is also planning that illustrate the relationship between the input and output parameters of the model. These planes allow you to determine the management decision on the choice of measures depending on the values of the selected parameters. The paper proposes three thresholds for the values of each of the protective measures, which determine the need for the measures used to neutralize the simulated threats. The influence of input variables on the output values of the constructed model identify a change in the distribution of the terms of the membership functions of the input parameters, the change of which can significantly affect the final decision on information security management. Discussion: the results of the work indicate the need for an adequate description of both the input variables and the response of the output variables of the model to the input variables in order to take effective measures to protect information.
APA, Harvard, Vancouver, ISO, and other styles
9

Livshitz, Ilya. "Assessment of the Impact of General Data Protection Regulation on Enterprise Security in the Russian Federation." Voprosy kiberbezopasnosti, no. 4(38) (2020): 66–75. http://dx.doi.org/10.21681/2311-3456-2020-04-66-75.

Full text
Abstract:
Abstract The purpose of the study is to analyze the existing requirements for personal data security and assess the impact of these requirements on the enterprises security in the Russian Federation. Research method: the problem of ensuring the security of personal data in accordance with the requirements of the Federal law of the Russian Federation FZ-152 and the international General Data Protection Regulation is investigated. The article analyzes the possible risks of interrupting the normal activities of enterprises in the Russian Federation due to violations of these requirements for personal data protection and the imposition of significant fines by international regulators. Numerical relationships are estimated between the amount of fines for violations of established requirements, including General Data Protection Regulation, and the cost of creating an effectiveness personal data protection system. Estimates of the permissible degree of influence of the General Data Protection Regulation requirements on the enterprises security in the Russian Federation are obtained. Research result: a study and comparison of possible penalties for violation of compliance with the requirements of the Federal law of the Russian Federation FZ-152 and the international General Data Protection Regulation was performed. Risk assessments of sanctions for violation of the established requirements for personal data protection were obtained. The analysis of the cost of preparing a personal data protection system for compliance with the requirements of the General Data Protection Regulation was performed. Based on the data obtained, examples of calculating the degree of maturity of the security system are presented – based on the ratio of the share of the budget allocated for security in relation to the cost of creating an effectiveness personal data protection system and based on the ratio of the amount of the fine for violation of the established requirements. The importance of accounting for the costs of personal data security to ensure the security of enterprises in the Russian Federation, taking into account the requirements of the General Data Protection Regulation, is shown
APA, Harvard, Vancouver, ISO, and other styles
10

Dai, Xue Bing, Zhao Jing Wang, and Yan Zhang. "Data Security and Privacy Protection of Cloud Computing." Advanced Materials Research 846-847 (November 2013): 1570–73. http://dx.doi.org/10.4028/www.scientific.net/amr.846-847.1570.

Full text
Abstract:
Data security and privacy protection of cloud computing as a new IT application mode are the most valued and concerned issues of the cloud user,and thus of utmost significance to the security of cloud computing. This paper describes and analyzes in detail the risks of data security and privacy showup brought by cloud computing,discusses the protective approaches of data security and privacy in cloud computing environment. Furthermore, this paper based on the newly developed fully homomorphism encryption then proposed a data security scheme which can operate encrypted data directly on cloud server without decrypt while all communication between client and server is encrypted, it can assure data security at the mean time assure the operate efficiency.
APA, Harvard, Vancouver, ISO, and other styles
11

Viana da Silva, Marcos Vinicius, Erick Da Luz Scherf, and Jose Everton Da Silva. "THE RIGHT TO DATA PROTECTION VERSUS “SECURITY”." Revista Direitos Culturais 15, no. 36 (April 27, 2020): 209–32. http://dx.doi.org/10.20912/rdc.v15i36.18.

Full text
Abstract:
The protection of personal data in the cyberspace has been an issue of concern for quite some time. However, with the revolutions in information technology, big data and the internet of things, data privacy protection has become paramount in an era of free information flows. Considering this context, this research intends to shine a light on the experience of Brazil regarding data privacy protection, through the analysis of a brand new bill passed by Congress: the Brazilian General Personal Data Protection Act. Our assessment of the legislation was made from the perspective of a human rights-based approach to data, aiming to analyze both advancements, limitations and contradictions of the rights-discourse in the LGPD. Our main conclusions were that the (public and national) security rhetoric, also present in the bill, can create a state of exception regarding the processing of personal data of those considered “enemies of the state”, which may result in violations of fundamental rights and procedural guarantees.
APA, Harvard, Vancouver, ISO, and other styles
12

Pounder, Chris. "Security and the new Data Protection law." Computers & Security 17, no. 2 (January 1998): 124–28. http://dx.doi.org/10.1016/s0167-4048(97)81981-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Saxby, Stephen. "Data protection act 1984: Security and accuracy of data." Computer Law & Security Review 2, no. 2 (July 1986): 14. http://dx.doi.org/10.1016/0267-3649(86)90065-8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
14

Williamson, J. D. "Data protection and the clinician: guidelines on data security." BMJ 291, no. 6507 (November 23, 1985): 1516–19. http://dx.doi.org/10.1136/bmj.291.6507.1516.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

István, Zsolt, Soujanya Ponnapalli, and Vijay Chidambaram. "Software-defined data protection." Proceedings of the VLDB Endowment 14, no. 7 (March 2021): 1167–74. http://dx.doi.org/10.14778/3450980.3450986.

Full text
Abstract:
Most modern data processing pipelines run on top of a distributed storage layer, and securing the whole system, and the storage layer in particular, against accidental or malicious misuse is crucial to ensuring compliance to rules and regulations. Enforcing data protection and privacy rules, however, stands at odds with the requirement to achieve higher and higher access bandwidths and processing rates in large data processing pipelines. In this work we describe our proposal for the path forward that reconciles the two goals. We call our approach "Software-Defined Data Protection" (SDP). Its premise is simple, yet powerful: decoupling often changing policies from request-level enforcement allows distributed smart storage nodes to implement the latter at line-rate. Existing and future data protection frameworks can be translated to the same hardware interface which allows storage nodes to offload enforcement efficiently both for company-specific rules and regulations, such as GDPR or CCPA. While SDP is a promising approach, there are several remaining challenges to making this vision reality. As we explain in the paper, overcoming these will require collaboration across several domains, including security, databases and specialized hardware design.
APA, Harvard, Vancouver, ISO, and other styles
16

Al-Museelem, Waleed, and Chun Lin Li. "Data Security and Data Privacy in Cloud Computing." Advanced Materials Research 905 (April 2014): 687–92. http://dx.doi.org/10.4028/www.scientific.net/amr.905.687.

Full text
Abstract:
Cloud computing has led to the development of IT to more sophisticated levels by improving the capacity and flexibility of data storage and by providing a scalable computation and processing power which matches the dynamic data requirements. Cloud computing has many benefits which has led to the transfer of many enterprise applications and data to public and hybrid clouds. However, many organizations refer to the protection of privacy and the security of data as the major issues which prevent them from adopting cloud computing. The only way successful implementation of clouds can be achieved is through effective enhancement and management of data security and privacy in clouds. This research paper analyzes the privacy and protection of data in cloud computing through all data lifecycle stages providing an overall perspective of cloud computing while highlighting key security issues and concerns which should be addressed. It also discusses several current solutions and further proposes more solutions which can enhance the privacy and security of data in clouds. Finally, the research paper describes future research work on the protection of data privacy and security in clouds.
APA, Harvard, Vancouver, ISO, and other styles
17

John, Nicolas, and Maximilian Wellmann. "Data security management and data protection for video conferencing software." International Cybersecurity Law Review 1, no. 1-2 (October 2020): 39–50. http://dx.doi.org/10.1365/s43439-020-00013-4.

Full text
Abstract:
Abstract Corona crisis and video conferencing software – two terms that now belong together. However, the demands controllers have on video conferencing software can quickly reach the limits of data protection regulations. In recent years, the progressive development of video conferencing software has already excited many users and led to significant growth. In ad hoc situations, like the Corona pandemic, issues regarding data protection are all too often neglected. This is fatal considering the fact that the implementation of video conferencing software is accompanied by a large number of data protection and security issues that must be addressed and weighed up by the controller. At first glance, technically feasible solutions can quickly turn out to be “Trojan horses” and pose a serious threat to personal data. Therefore, the selection, set-up and use of data protection-compliant video conferencing software is of great importance for controllers. This article aims to examine relevant questions regarding data protection and security management from a European legal perspective. In particular, the detailed analysis of the requirements of the General Data Protection Regulation (GDPR) as well as the practical consequences for the controller should provide practicians an overview of the legal problems associated with the implementation and use of video conferencing software.
APA, Harvard, Vancouver, ISO, and other styles
18

Гулов, Владимир Павлович, Виктор Анатольевич Хвостов, Владимир Петрович Косолапов, and Галина Владимировна Сыч. "PERSONAL DATA PROTECTION FEATURES IN MOBILE MEDICINE." СИСТЕМНЫЙ АНАЛИЗ И УПРАВЛЕНИЕ В БИОМЕДИЦИНСКИХ СИСТЕМАХ, no. 3() (September 30, 2020): 171–76. http://dx.doi.org/10.36622/vstu.2020.19.3.022.

Full text
Abstract:
Проведен анализ особенностей применения медицинских технологий, использующих мобильные приложения для повышения эффективности оказания медицинских услуг пациентам (мобильная медицина). На основе анализа уязвимостей характерных для мобильных систем и уязвимости медицинских информационных систем с мобильным доступом пациентов и сотрудников медицинской организации, новых атак, направленных на уязвимости мобильных технологий и протоколов сотовой связи и беспроводного доступа скорректированы цели безопасности и контекст безопасности организации. Для решения задач безопасности, возникающих при использовании технологий мобильной медицины, предложены типовая архитектура безопасности, способы защиты информации и проведен анализ возможных технических средств защиты. Целью архитектуры безопасности мобильной медицины является обеспечение конфиденциальности, целостности и доступности информационных ресурсов медицинской организации при доступе к ней с мобильных станций (смартфонов, планшетов, смарт устройств и т.п.). Основой архитектуры безопасности мобильной медицины могут являться средства обеспечения безопасности, такие как виртуальные частные сети, системы обнаружения вторжений, системы слежения за действиями пользователя, а также такие средства защиты информации как менеджер мобильных устройств и менеджер мобильных приложений The analysis of the features of the application of medical technologies using mobile applications to improve the efficiency of the provision of medical services to patients (mobile medicine) is carried out. Based on the analysis of vulnerabilities characteristic of mobile systems and the vulnerability of medical information systems with mobile access for patients and employees of a medical organization, new attacks aimed at vulnerabilities of mobile technologies and protocols of mobile communications and wireless access, the security objectives and the security context of the organization are adjusted. To solve the security problems arising from the use of mobile medicine technologies, a typical security architecture, methods for protecting information, and an analysis of possible technical means of protection are proposed. The purpose of the security architecture of mobile medicine is to ensure the confidentiality, integrity and accessibility of information resources of a medical organization when accessing it from mobile stations (Smartphone's, tablets, smart devices, etc.). The basis of the mobile medicine security architecture can be security tools such as virtual private networks, intrusion detection systems, user activity tracking systems, and information security tools such as a mobile device manager and mobile application manager
APA, Harvard, Vancouver, ISO, and other styles
19

Bogosavljević, Mirjana. "Protection of Personal Data in Documents: Application of the Law on Personal Data Protection in Serbia and Abroad." Moderna arhivistika 2, no. 1 (May 1, 2019): 106–15. http://dx.doi.org/10.54356/ma/2019/ghkv7413.

Full text
Abstract:
The rapid and continuous development of information technologies that encompasses almost all spheres of social life, imposes the key issue of protecting the privacy personal data, the issue of their availability, the way of their storage, processing, transmission and use. The contemporary concept of privacy puts emphasis on information control, security and data protection in computer information systems. Protection of privacy primarily concerns the issue of protection against abuse, fraud, embezzlement and deliberate or accidental damage. This paper covers several key issues: what are the mechanisms for protecting personal data in documents; is it feasible to achieve higher security of computer systems in terms of data protection; is it possible to limit the distribution of certain types of data (medical reports, financial institutions, schools); what is done regarding data protection in terms of establishing laws, regulations and standards. From the point of view of archivists and archival staff in the era of digitalization of archival material when it becomes accessible and available for use, the protection of personal data in documents is certainly an issue that deserves special attention and consideration. The paper shall provide an overview on the up to date achievements in this field within the archival services in our country and abroad.
APA, Harvard, Vancouver, ISO, and other styles
20

石, 飞杰. "Citizen Data Security Protection from the Perspective of “DiDi” Security Review." Open Journal of Legal Science 09, no. 06 (2021): 663–69. http://dx.doi.org/10.12677/ojls.2021.96095.

Full text
APA, Harvard, Vancouver, ISO, and other styles
21

Corones, Stephen, and Juliet Davis. "Protecting Consumer Privacy and Data Security: Regulatory Challenges and Potential Future Directions." Federal Law Review 45, no. 1 (March 2017): 65–95. http://dx.doi.org/10.1177/0067205x1704500104.

Full text
Abstract:
This article considers the regulatory problems of online tracking behaviour, lack of consent to data collection, and the security of data collected with or without consent. Since the mid-1990s the United States Federal Trade Commission has been using its power under the United States consumer protection regime to regulate these problems. The Australian Competition and Consumer Commission (ACCC), on the other hand, has yet to bring civil or criminal proceedings for online privacy or data security breaches, which indicates a reluctance to employ the Australian Consumer Law (‘ACL’) in this field.1 Recent legislative action instead points to a greater application of the specifically targeted laws under the Privacy Act 1988 (Cth) (‘Privacy Act’), and the powers of the Office of the Australian Information Commissioner (OAIC), to protect consumer privacy and data security. This article contends that while specific legislation setting out, and publicly enforcing, businesses’ legal obligations with respect to online privacy and data protection is an appropriate regulatory response, the ACL's broad, general protections and public and/or private enforcement mechanisms also have a role to play in protecting consumer privacy and data security.
APA, Harvard, Vancouver, ISO, and other styles
22

Zhurakovskyi, Bohdan, and Oleksiy Nedashkivskiy. "SYSTEM TO COLLECT INFORMATION WHEN TRANSFERRING DATA TO RADIO CHANNELS." Cybersecurity: Education, Science, Technique 3, no. 15 (2022): 6–34. http://dx.doi.org/10.28925/2663-4023.2022.15.634.

Full text
Abstract:
This article is devoted to solving the problem of information protection in radio channels, by applying comprehensive measures to protect against possible attacks aimed at intercepting and substituting transmitted data. The aim of the work is to analyze the security of wireless networks, identify methods for their protection and create a model for protecting wireless networks. In order to achieve this goal, the following list of tasks was performed: the existing solutions in the field of information protection through radio networks were analyzed; the description of the offered developed model is made; algorithms, experiments, experiments of this model are described. A means of protecting information through radio networks has been developed, the application of which has a significant increase in the level of information security in the radio channel. The practical value of this development is that the theoretical and practical results are recommended for implementation in organizations that use the radio channel to transmit confidential information with high security requirements
APA, Harvard, Vancouver, ISO, and other styles
23

Qin, Peng, Wei Li, and Ke Ding. "A Big Data Security Architecture Based on Blockchain and Trusted Data Cloud Center." Wireless Communications and Mobile Computing 2022 (August 31, 2022): 1–8. http://dx.doi.org/10.1155/2022/7272405.

Full text
Abstract:
In view of the shortcomings of big data security and privacy protection in cloud environment, a big data security architecture was proposed in this paper. Based on blockchain technology and trusted data cloud center, data security architecture adopts the ideas of trusted authentication, intrusion detection, data segmentation, and decentralized storage and applies Amazon AWS log processing service, PairHand user authentication protocol, and Hadoop data analysis framework to realize dig data security and privacy protection in the cloud environment. This paper realizes system initialization and user authentication, hierarchical data storage, decentralized storage, and user security access. The experimental results show that the system architecture can ensure data security and data access speed, which can provide necessary reference for cloud security.
APA, Harvard, Vancouver, ISO, and other styles
24

Michelberger, Pál, and Ágnes Kemendi. "DATA, INFORMATION AND IT SECURITY - SOFTWARE SUPPORT FOR SECURITY ACTIVITIES." Problems of Management in the 21st Century 15, no. 2 (December 10, 2020): 108–24. http://dx.doi.org/10.33225/pmc/20.15.108.

Full text
Abstract:
Data protection, information and IT security became number one priorities in these fast- paced days that top management needs to focus on. A number of IT solutions have been developed on the market to address the security challenges that require prompt actions. These solutions contribute to a control environment that is robust and stand the potential threats. This research describes the framework of governance, risk and compliance and provides an integrated, holistic approach which helps to increase process performance and to ensure that the organization follows its own rules, risk appetite, and complies with external regulations. These systems fulfil a core role in the enterprise’s defense system. This research reviews the features of security packages relevant to IT GRC and provides an overview of the security elements and describes their main characteristics. This review covers the configuration database related to the enterprise business model; the business impact analysis; the risk management-, governance and compliance functions; the data security; the data protection and GDPR; the business continuity management; the network -, IoT - and industrial control system safety, the access - and log management. Embedding these solutions to the business and operations processes strengthens the response of an organization to the various risks and requirements that it faces and reduces the likelihood of major non-compliance or security gaps. Keywords: data protection, GRC software solutions, information security
APA, Harvard, Vancouver, ISO, and other styles
25

K.A., Chicherov, and Norkina A. N. "Confidential Data Protection as a Means of Ensuring Information Security." KnE Social Sciences 3, no. 2 (February 15, 2018): 85. http://dx.doi.org/10.18502/kss.v3i2.1528.

Full text
Abstract:
This article presents issues of protecting confidential data, ways to support information security, types of information security threats resulting in an authorized access to confidential data, countermeasures and security measures to ensure confidential data security. Keywords: confidential data, information security, information security threat(s), personal data, information systems, data security.
APA, Harvard, Vancouver, ISO, and other styles
26

Singh, Gurpreet, and Susmita Mishra. "CLOUD COMPUTING SECURITY AND DATA PROTECTION: A REVIEW." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 14, no. 7 (May 14, 2015): 5887–94. http://dx.doi.org/10.24297/ijct.v14i7.1893.

Full text
Abstract:
Scientific computing in the 21st century has evolved from fixxed to distributed work environment. The current trend of Cloud Computing (CC) allows accessing business applications from anywhere just by connecting to the Internet. Evidence shows that, switching to CC organizations' annual expenditure and maintenance are being reduced to a greater extent. However, there are several challenges that come along with various benefits of cloud computing. Among these include security aspects. Our aim is to identify security challenges for adapting cloud computing and their solutions from real world for the challenge that do not have any proper mitigation strategies identified.This non-existence of global standards and guidelines could be help academics to know the state of practice and formulate better methods/standards to provide secure interoperability. The identified cloud computing security challenges and solutions, can be referred by practitioners to understand which areas of security need to be concentrated while adapting/migrating to a cloud computing environment.Â
APA, Harvard, Vancouver, ISO, and other styles
27

Yu, Yang. "Encryption Technology for Computer Network Data Security Protection." Security and Communication Networks 2022 (August 22, 2022): 1–9. http://dx.doi.org/10.1155/2022/1789222.

Full text
Abstract:
In order to solve the network security problem of data encryption technology, this paper proposes a research method of computer network information security maintenance based on data encryption technology. Taking the network reporting system of a mining enterprise as the research object, this paper comprehensively expounds on the design of network reporting system and data encryption in network communication from the aspects of demand investigation, demand analysis, system design, software system development, and so on and implements the development by using BS architecture + independent client. The experimental results show that the AES algorithm can be independently designated as 128 bits, 192 bits, and 256 bits. Conclusion. This scheme can realize the rapid and safe transmission of data information and provide an effective means for the transmission of confidential documents on the network, so it has a good application prospect.
APA, Harvard, Vancouver, ISO, and other styles
28

Golubova, Anguelina, and Vera Shumilina. "INFORMATION SECURITY AND DATA PROTECTION IN MODERN SOCIETY." Science & World, no. 2 (June 10, 2022): 6–10. http://dx.doi.org/10.26526/2307-9401-2022-2-6-10.

Full text
Abstract:
This article looks at the principles of information security, and the ways in which information can be protected. Examines the problems of protecting information, unauthorised access to it. Demonstrates the types of viruses that exist on the Internet. Offers software to help the user protect themselves from them
APA, Harvard, Vancouver, ISO, and other styles
29

Lee, Calvin, and Gouher Ahmed. "Improving IoT Privacy, Data Protection and Security Concerns." International Journal of Technology, Innovation and Management (IJTIM) 1, no. 1 (September 1, 2021): 18–33. http://dx.doi.org/10.54489/ijtim.v1i1.12.

Full text
Abstract:
IoT has continued to evolve over the years with a promise to provide the users with effective means to interact, communicate, transact and create strong relationship. The invention and the development of IoT have created benefits for many businesses and individuals. However, as the IoT continues to evolve and develop, it has been subjected to certain threats and vulnerabilities. The common vulnerabilities notable in IoT include the security, privacy and data protection concerns. These issues have not been addressed by many scholars thus necessitated the need for this research study. Therefor the research study was concerned with the developed of a new IoT model that can enhance the security and privacy of the users of the IoT. The results indicate that the new model can be effective in addressing the needs of the IoT users. However, it noted that future research studies are still needed to improve the performance of the IoT security models.
APA, Harvard, Vancouver, ISO, and other styles
30

Ke, ZHANG, and LI Yongzhen. "Research on Internet data security and privacy protection." Journal of Physics: Conference Series 2005, no. 1 (August 1, 2021): 012004. http://dx.doi.org/10.1088/1742-6596/2005/1/012004.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

Edwards, L. "Privacy, Security and Data Protection in Smart Cities:." European Data Protection Law Review 2, no. 1 (2016): 28–58. http://dx.doi.org/10.21552/edpl/2016/1/6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Seife, C. "COMPUTER SECURITY: Flaw Found in Data-Protection Method." Science 307, no. 5714 (March 4, 2005): 1389a. http://dx.doi.org/10.1126/science.307.5714.1389a.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Vancollie, Guy. "Data protection as the ‘Third Pillar’ of security." Infosecurity Today 3, no. 6 (November 2006): 41. http://dx.doi.org/10.1016/s1742-6847(06)70484-0.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Kaijser, Per. "Security protection for parts of a data structure." Computer Communications 17, no. 7 (July 1994): 476–82. http://dx.doi.org/10.1016/0140-3664(94)90102-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
35

Joseph, Allen Oommen, Jaspher W. Kathrine, and Rohit Vijayan. "Cloud Security Mechanisms for Data Protection: A Survey." International Journal of Multimedia and Ubiquitous Engineering 9, no. 9 (September 30, 2014): 81–90. http://dx.doi.org/10.14257/ijmue.2014.9.9.09.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Jakimoski, Kire. "Security Techniques for Data Protection in Cloud Computing." International Journal of Grid and Distributed Computing 9, no. 1 (January 31, 2016): 49–56. http://dx.doi.org/10.14257/ijgdc.2016.9.1.05.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Parraguez Kobek, Luisa, and Erick Caldera. "Cyber Security and Habeas Data: The Latin American response to information security and data protection." OASIS, no. 24 (November 3, 2016): 109. http://dx.doi.org/10.18601/16577558.n24.07.

Full text
Abstract:
Habeas Data is not a commonly known concept, yet it is widely acknowledged in certain circles that deal with information security and data protection. Though it has been around for decades, it has recently gained momentum in Latin America. It is the legal notion that protects any and all information pertaining to the individual, from personal to financial, giving them the power to decide how and where such data can be used. At the same time, most Latin American countries have created laws that protect individuals if their information is misused. This article examines the concept of Habeas Data from its inception to its current applications, and explains the different approaches and legislations passed in Latin American countries on data protection due to the rise of global cybercrime.
APA, Harvard, Vancouver, ISO, and other styles
38

Padmashree*, M. G., J. S. Arunalatha, and K. R. Venugopal. "Data Protection Mechanisms in IoT: A Vital Challenge." International Journal of Engineering and Advanced Technology 10, no. 6 (August 30, 2021): 92–103. http://dx.doi.org/10.35940/ijeat.f3020.0810621.

Full text
Abstract:
The Internet of Things (IoT) associated with life is a budding real-time environment paradigm. Smart Users can control and analyze Things through Smart gadgets connected through the network. As gazillions of devices are connected and communicated via a complex, distributed network, the number of potential threats and attacks has grown drastically against protection and privacy. Security must be provided continuously for IoT service. Exploring the issues to be improved in IoT setup includes Information Secrecy, Access Control, Authentication, Integrity, Privacy, and Trust. The paper summarizes the issues with IoT device security and the efficiency of the existing security solutions. This paper analyses the schemes to guard IoT communications and the methods adopted by the researchers while providing security of data in IoT.
APA, Harvard, Vancouver, ISO, and other styles
39

Kucher, V. A., M. M. Putyato, A. S. Makaryan, and M. A. Karmanov. "Investigation of User Data Security for Android-based «Signal» Messenger." Proceedings of Tomsk State University of Control Systems and Radioelectronics 24, no. 2 (2021): 23–28. http://dx.doi.org/10.21293/1818-0442-2021-24-2-23-28.

Full text
Abstract:
The article presents the security analysis of locally stored enduser data, as well as the specifics of working with them in the application called “Signal” based on Android OS. The investigated version 5.3.12 was the most recent one up to the time of writing this article. According to a certain scenario, test user data was generated in the application, and then the sources information with critical data was extracted from this data. Using the open-source code available, the mechanisms of the application's operation, including the implementation of protection measures, wit the specified critical data were identified and analyzed. A qualitative assessment of implementing protection mechanisms for locally stored critical data was made to distinguish the data with typical protection measures inherent for any mobile applications, and the one specific for applications of this particular class of messengers. As a result, the flaws were discovered related to the inaccessibility of certain protective mechanisms on specific versions of the Android operating system, which could compromise the user data. As an advantage of the messenger protection, the database encryption module could be specified, which provides strong protection against unauthorized access to information due to the lack of a specific version of the assembly for personal computers. This article also proposes an approach to decrypt messenger databases, which requires either an emulator of an Android-based device, or a real mobile device with a specially developed application
APA, Harvard, Vancouver, ISO, and other styles
40

Ogiela, Lidia, Marek R. Ogiela, and Hoon Ko. "Intelligent Data Management and Security in Cloud Computing." Sensors 20, no. 12 (June 18, 2020): 3458. http://dx.doi.org/10.3390/s20123458.

Full text
Abstract:
This paper will present the authors’ own techniques of secret data management and protection, with particular attention paid to techniques securing data services. Among the solutions discussed, there will be information-sharing protocols dedicated to the tasks of secret (confidential) data sharing. Such solutions will be presented in an algorithmic form, aimed at solving the tasks of protecting and securing data against unauthorized acquisition. Data-sharing protocols will execute the tasks of securing a special type of information, i.e., data services. The area of data protection will be defined for various levels, within which will be executed the tasks of data management and protection. The authors’ solution concerning securing data with the use of cryptographic threshold techniques used to split the secret among a specified group of secret trustees, simultaneously enhanced by the application of linguistic methods of description of the shared secret, forms a new class of protocols, i.e., intelligent linguistic threshold schemes. The solutions presented in this paper referring to the service management and securing will be dedicated to various levels of data management. These levels could be differentiated both in the structure of a given entity and in its environment. There is a special example thereof, i.e., the cloud management processes. These will also be subject to the assessment of feasibility of application of the discussed protocols in these areas. Presented solutions will be based on the application of an innovative approach, in which we can use a special formal graph for the creation of a secret representation, which can then be divided and transmitted over a distributed network.
APA, Harvard, Vancouver, ISO, and other styles
41

Han, Linrui. "Personal Privacy Data Protection in Location Recommendation System." Journal of Physics: Conference Series 2138, no. 1 (December 1, 2021): 012026. http://dx.doi.org/10.1088/1742-6596/2138/1/012026.

Full text
Abstract:
Abstract At present, there are many location-based recommendation algorithms and systems, including location calculation, route calculation, and so on. However, in the general information data publishing, the privacy issues in the published data have not been fully paid attention to and protected. The purpose of this article is to investigate the effectiveness of personal privacy data protection in location recommendation systems. This paper first introduces the basis and importance of research on data security and secrecy, analyses personal privacy issues in data publishing in the era of big data, summarizes the research status in the field of security and secrecy at home and abroad, and introduces the process of data security and the role of users in it. Then, some classic privacy security modules in this field are introduced, and the privacy of data storage security concepts in the current situation mentioned in this paper is analyzed. A geographic location-based privacy protection scheme in mobile cloud is proposed. Privacy analysis, sensitive attribute generalization information analysis, route synthesis analysis and related experiments are performed on the location recommendation system. The experimental results show that the scheme proposed in this paper is more secure and has less loss of data availability.
APA, Harvard, Vancouver, ISO, and other styles
42

Tovino, Stacey A. "Mobile Research Applications and State Data Protection Statutes." Journal of Law, Medicine & Ethics 48, S1 (2020): 87–93. http://dx.doi.org/10.1177/1073110520917033.

Full text
Abstract:
This article focuses on state privacy, security, and data breach regulation of mobile-app mediated health research, concentrating in particular on research studies conducted or participated in by independent scientists, citizen scientists, and patient researchers. Prior scholarship addressing these issues tends to focus on the lack of application of the HIPAA Privacy and Security Rules and other sources of federal regulation. One article, however, mentions state law as a possible source of privacy and security protections for individuals in the particular context of mobile app-mediated health research. This Article builds on this prior scholarship by: (1) assessing state data protection statutes that are potentially applicable to mobile app-mediated health researchers; and (2) suggesting statutory amendments that could better protect the privacy and security of mobile health research data. As discussed in more detail below, all fifty states and the District of Columbia have potentially applicable data breach notification statutes that require the notification of data subjects of certain informational breaches in certain contexts. In addition, more than two-thirds of jurisdictions have potentially applicable data security statutes and almost one-third of jurisdictions have potentially applicable data privacy statutes. Because all jurisdictions have data breach notification statutes, these statutes will be assessed first.
APA, Harvard, Vancouver, ISO, and other styles
43

Raković, Radoslav. "Personal data protection: Actual status and challenges." Tehnika 77, no. 5 (2022): 501–8. http://dx.doi.org/10.5937/tehnika2204501r.

Full text
Abstract:
Fundamental information security management standard ISO 27001 declares need for protecting basic features of information - confidentiality, integrity and availability - and defines 114 controls oriented to technical, organizational and combined actions that should enable it. Particular issue represents personal data protection that is subject of particular General Data protection Regulation (GDPR) has been appplied in EU from 25.05.2018. and paricular Law on personal data protection of Republic of Serbia has been applied from 22.08.2019. After brief review of the GDPR and the subject law, actual status of personal data protection in Serbia are considered, as well as challenges we will face in the future in this area.
APA, Harvard, Vancouver, ISO, and other styles
44

Sabari prasanth, G., and M. Rajasekaran. "Protection Preserving Over Encrypted Data Using Key with Similarity Check." International Journal of Engineering & Technology 7, no. 3.12 (July 20, 2018): 269. http://dx.doi.org/10.14419/ijet.v7i3.12.16039.

Full text
Abstract:
Computing gives people to store enormous data efficiently and economically since it depends on third party management security is the million dollar question. In order to provide protection over the private data user can encrypt the data and can upload in cloud. Encryption process could be done by Advanced Encryption Standard (AES) algorithm which is highly secure and unbreakable. Encrypted data with key management play significant role in cloud computing in order to get decrypted data user should appropriate key for the file to get decrypted data which would be transferred very securely. Proposed system try to avoid update of unwanted data like inappropriate sentences will be avoided from malicious user to misuse the data .The concept of data mining plays a vital role. This concept of combination of cloud computing and data mining gives us the good result of security of personal detail and unwanted data would not accommodate on the internet .This process would help mostly on providing authenticated data by only legitimate user can access the data even legitimate user cannot find the decrypted content if unwanted data exist in the file. This approach have overcome security issues of own personal or organization data.
APA, Harvard, Vancouver, ISO, and other styles
45

Buldakova, T. I., D. A. Mikov, and A. V. Sokolova. "Data Security at Remote Monitoring of Human State." Herald of the Bauman Moscow State Technical University. Series Instrument Engineering, no. 4 (133) (December 2020): 42–57. http://dx.doi.org/10.18698/0236-3933-2020-4-42-57.

Full text
Abstract:
The paper focuses on telemedicine systems for monitoring the human state and methods of protecting the transmitted data. To assess the state, biosignals are used, which are recorded by sensors and transmitted to a cloud medical information system. Based on the data obtained, a decision is made about the human state. Since the monitoring system works with restricted access information, it must be reliably protected. The study places an emphasis on possible information security threats for all components of the telemedicine system, analyzes various approaches to the protection of transmitted data in remote monitoring systems. It is noted that the existing methods are insufficient and additional methods of protecting the transmitted data are required. It is proposed to assess data security using the information risk management methods
APA, Harvard, Vancouver, ISO, and other styles
46

Chan, Tom, Concetta Tania Di Iorio, Simon De Lusignan, Daniel Lo Russo, Craig Kuziemsky, and Siaw-Teng Liaw. "UK National Data Guardian for Health and Care’s Review of Data Security: Trust, better security and opt-outs." Journal of Innovation in Health Informatics 23, no. 3 (December 20, 2016): 627. http://dx.doi.org/10.14236/jhi.v23i3.909.

Full text
Abstract:
Sharing health and social care data is essential to the delivery of high quality health care as well as disease surveillance, public health, and for conducting research. However, these societal benefits may be constrained by privacy and data protection principles. Hence, societies are striving to find a balance between the two competing public interests. Whilst the spread of IT advancements in recent decades has increased the demand for an increased privacy and data protection in many ways health is a special case.UK, are adopting guidelines, codes of conduct and regulatory instruments aimed to implement privacy principles into practical settings and enhance public trust. Accordingly, in 2015, the UK National Data Guardian (NDG) requested to conduct a further review of data protection, referred to as Caldicott 3. The scope of this review is to strengthen data security standards and confidentiality. It also proposes a consent system based on an “opt-out” model rather than on “opt-in.Across Europe as well as internationally the privacy-health data sharing balance is not fixed. In Europe enactment of the new EU Data Protection Regulation in 2016 constitute a major breakthrough, which is likely to have a profound effect on European countries and beyond. In Australia and across North America different ways are being sought to balance out these twin requirements of a modern society - to preserve privacy alongside affording high quality health care for an ageing population. Whilst in the UK privacy legal framework remains complex and fragmented into different layers of legislation, which may negatively impact on both the rights to privacy and health the UK is at the forefront in the uptake of international and EU privacy and data protection principles. And, if the privacy regime were reorganised in a more comprehensive manner, it could be used as a sound implementation model for other countries.
APA, Harvard, Vancouver, ISO, and other styles
47

Zhang, Jianwen, and Huan Yang. "Ensuring data security in electronic form (About the draft law of the People’s Republic of China “On data security”)." Legal Science in China and Russia, no. 4 (September 16, 2021): 74–81. http://dx.doi.org/10.17803/2587-9723.2021.4.074-081.

Full text
Abstract:
Digital data is a new factor of production in the information age. In the context of the rapiddevelopment of the latest technologies, such as big data, artifi cial intelligence, cloud computing andblockchain, as well as the continuous development of the digital economy, digital data plays an important role in the development of enterprises. Data security issues affect the development of a countryand its security, are related to public interests, and are also closely related to the personal rights of its citizens. It is necessary to regulate data protection at the legal level.July 2, 2020 the website of the National People’s Congress published the Data Security Law of the People’s Republic of China (draft), which systematically refl ects the current national point of view on data security and development, noting the improvement of data security to the level of state security. Like the Cybersecurity Law, it is a component of the general concept of national security, belongs to the highest level of law and has the highest legal force. This law is of great strategic importance for building a data protection system in the PRC.As the main law in the fi eld of data security management ,the Data Security Law has made certain breakthroughs in the defi nition of the concept of data. The concept of data in the Data Security Law is not limited to network data, but includes information recorded in electronic form and in other ways; the necessary extraterritorial consequences are provided for in the draft Data Security Law, which is of great importance for the protection of national sovereignty and civil rights of the People’s Republic of China; the relationship between data security protection, data development and use is clarifi ed, and the status of data in the development of the digital economy is clarifi ed through legislation in order to fully demonstrate the economic value of data; the main body responsible for security, supervision and overall coordination has been created, the main responsibilities of various regions and departments have been increased, supervision responsibilities have been redistributed, which is more in line with the needs and current situation in data security supervision; a data classifi cation system has been established that promotes the relevant work of data security surveillance agencies; an appropriate mechanism has been created at the state level in the system of data security risk assessment, reporting, information exchange, monitoring and early warning; a data export control system and a mutual data protection system were created, as well as the construction of a cross-border data fl ow system of the PRC was standardized; data protection obligations in organizations and for individuals performing data operations and performing data protection duties were clarifi ed; adhere to the principles of security and development and provide measures to support and promote data security and development; institutional measures have been taken to ensure the security of government data.The draft law on data security contains a comprehensive concept of information security. The upcoming Law on Data Security will contain recommendations and basic principles for ensuring data security and development. All industries will have to pay attention to an integrated management system and various supporting provisions to ensure data security and development. Gradually, a favorable environment will be created for the effective use of data and safe development, which will signifi cantly contribute to the rapid development of informatization and digitization.The Data Security Law includes all types of information in the fi eld of protection. In the future, the Law on Data Security should pay attention to the Law on Cybersecurity, Law on State Security and Law on the Protection of Personal Information, which are under development, supplement and improve today’s relatively disparate legislation related to data security. The laws and regulations of the PRC on data security will be carefully developed on the basis of these three laws in order to fully implement the development, use of data and industrial development, thereby promoting new provisions in the creation of a legal data security system.
APA, Harvard, Vancouver, ISO, and other styles
48

Kasapović, Suad, Emir Skejić, and Tarik Huremović. "Testing the Data Protection Through Implementation of Secure Communication." B&H Electrical Engineering 15, no. 2 (December 1, 2021): 21–30. http://dx.doi.org/10.2478/bhee-2021-0014.

Full text
Abstract:
Abstract The security of using applications in cloud services and on the Internet is an important topic in the field of engineering. In this paper, two laboratory tests for data transmission protection, specifically designed for different security analysis techniques, are presented and explained. During lab tests on public Wi-Fi networks from the MIDM (“Man in the Middle”) attacks, various monitoring techniques were applied, using a special lab test scenario with Kali Linux penetration tools by creating an SSH tunnel on an Android mobile device. These test benches allow easy data capturing, and the captured data is processed using available software programs. Expected outcomes, practical improvement and security performance assessment are presented in detail, and considered in terms of their value in security engineering. The aim of this paper is to detect and overcome some of the weaknesses of the application of security protocols in a Wi-Fi network environment.
APA, Harvard, Vancouver, ISO, and other styles
49

Astrakhantsev, Andrii, and Galyna Liashenko. "Data protection management process during remote biometric authentication." System research and information technologies, no. 3 (October 30, 2022): 71–85. http://dx.doi.org/10.20535/srit.2308-8893.2022.3.05.

Full text
Abstract:
Remote biometric authentication systems have recently become widespread due to the need to use common devices and make payments over the Internet. Because biometric methods are more user-friendly and now quickly replace passwords, the task of transmitting biometric information over an open network without compromising it is becoming urgent. This work aims to upgrade the remote authentication system to increase the secrecy and security of user biometric data. In order to achieve this goal, it is proposed to use the best security methods for forming biometric templates, network steganography to increase secrecy, and the introduction of an intelligent decision-making system. These improvements will increase the security and privacy of data during the remote authentication process.
APA, Harvard, Vancouver, ISO, and other styles
50

Konan, Martin, and Wenyong Wang. "Secure Anonymous Query-Based Encryption for Data Privacy Preserving in Cloud." International Journal of Information Security and Privacy 12, no. 4 (October 2018): 1–23. http://dx.doi.org/10.4018/ijisp.2018100101.

Full text
Abstract:
Data privacy protection is a paramount issue in cloud applications for the last decade. In addition, data encryption, which is the primary method to impart security in clouds, is proved insufficient to guarantee data privacy protection from some security issues like homogeneity and background knowledge attacks. Therefore, it is important to provide a security mechanism that provide not only anonymous data but also anonymous continuous queries. So, this paper proposes a new scheme (Moye) that tackles this challenge by protecting queries to be linked to specific sensitive data. Specifically, the proposed solution is based on the design of a hybrid implementation of public key encryption with keyword search (PEKS) and subset membership encryption (SME) cryptosystem to enhance both data and query privacy protection. In addition, this approach provides an efficient and anonymous data processing by using an optimized k-anonymity scheme. Doing so, the authors protect searchable keywords and queries from inside and outside guessing attacks for the effectiveness of the proposed solution.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography