Journal articles on the topic 'Information storage and retrieval systems - security'

To see the other types of publications on this topic, follow the link: Information storage and retrieval systems - security.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Information storage and retrieval systems - security.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Arunarani, Ar, and D. Manjula Perkinian. "Intelligent Techniques for Providing Effective Security to Cloud Databases." International Journal of Intelligent Information Technologies 14, no. 1 (January 2018): 1–16. http://dx.doi.org/10.4018/ijiit.2018010101.

Full text
Abstract:
Cloud databases have been used in a spate of web-based applications in recent years owing to their capacity to store big data efficiently. In such a scenario, access control techniques implemented in relational databases are so modified as to suit cloud databases. The querying features of cloud databases are designed with facilities to retrieve encrypted data. The performance with respect to retrieval and security needs further improvements to ensure a secured retrieval process. In order to provide an efficient secured retrieval mechanism, a rule- and agent-based intelligent secured retrieval model has been proposed in this paper that analyzes the user, query and contents to be retrieved so as to effect rapid retrieval with decryption from the cloud databases. The major advantage of this retrieval model is in terms of its improved query response time and enhanced security of the storage and retrieval system. From the experiments conducted in this work, proposed model increased storage and access time and, in addition, intensified the security of the data stored in cloud databases.
APA, Harvard, Vancouver, ISO, and other styles
2

Kovalcik, Justin, and Mike Villalobos. "Automated Storage & Retrieval System." Information Technology and Libraries 38, no. 4 (December 16, 2019): 114–24. http://dx.doi.org/10.6017/ital.v38i4.11273.

Full text
Abstract:
The California State University, Northridge (CSUN) Oviatt Library was the first library in the world to integrate an automated storage and retrieval system (AS/RS) into its operations. The AS/RS continues to provide efficient space management for the library. However, added value has been identified in materials security and inventory as well as customer service. The concept of library as space, paired with improved services and efficiencies, has resulted in the AS/RS becoming a critical component of library operations and future strategy. Staffing, service, and security opportunities paired with support and maintenance challenges, enable the library to provide a unique critique and assessment of an AS/RS.
APA, Harvard, Vancouver, ISO, and other styles
3

Bidve, Vijaykumar, Kiran Kakakde, Pakiriswamy Sarasu, Shailesh Kediya, Pradip Tamkhade, and Suprakash Sudarsanan Nair. "Patient data management using blockchain technology." Indonesian Journal of Electrical Engineering and Computer Science 32, no. 3 (December 1, 2023): 1746. http://dx.doi.org/10.11591/ijeecs.v32.i3.pp1746-1754.

Full text
Abstract:
<span>The patient data management is an essential component of healthcare systems, the secure and efficient data processing is important for the medical data. Data security, interoperability and privacy are the key requirements of data storage systems of healthcare organizations. The electronic medical records have become a key technique to maintain patient information in hospitals due to the technology revolution. Some hospital systems are also using server-based patient detail management systems, they require considerable storage to record all of the patient's medical reports, limiting scalability. They are facing difficulties, including interoperability, security and privacy worries, cyberattacks on centralized storage, and maintaining medical policy compliance simultaneously. The blockchain technology has come up with solution having decentralized and irreversible data storage. A distributed secure ledger of blockchain is the solution, enabling safe storage and retrieval of data. The proposed work yields effectively deployed smart contracts based on the system's functions, real-time patient health monitoring. The main goal of this system is to bring the whole medical data together on a single platform, employing a secured decentralized approach to store and retrieve medical information effectively.</span>
APA, Harvard, Vancouver, ISO, and other styles
4

Shojaei, Parisasadat, Elena Vlahu-Gjorgievska, and Yang-Wai Chow. "Security and Privacy of Technologies in Health Information Systems: A Systematic Literature Review." Computers 13, no. 2 (January 31, 2024): 41. http://dx.doi.org/10.3390/computers13020041.

Full text
Abstract:
Health information systems (HISs) have immense value for healthcare institutions, as they provide secure storage, efficient retrieval, insightful analysis, seamless exchange, and collaborative sharing of patient health information. HISs are implemented to meet patient needs, as well as to ensure the security and privacy of medical data, including confidentiality, integrity, and availability, which are necessary to achieve high-quality healthcare services. This systematic literature review identifies various technologies and methods currently employed to enhance the security and privacy of medical data within HISs. Various technologies have been utilized to enhance the security and privacy of healthcare information, such as the IoT, blockchain, mobile health applications, cloud computing, and combined technologies. This study also identifies three key security aspects, namely, secure access control, data sharing, and data storage, and discusses the challenges faced in each aspect that must be enhanced to ensure the security and privacy of patient information in HISs.
APA, Harvard, Vancouver, ISO, and other styles
5

Xie, Run, Chanlian He, Dongqing Xie, Chongzhi Gao, and Xiaojun Zhang. "A Secure Ciphertext Retrieval Scheme against Insider KGAs for Mobile Devices in Cloud Storage." Security and Communication Networks 2018 (June 6, 2018): 1–7. http://dx.doi.org/10.1155/2018/7254305.

Full text
Abstract:
With the advent of cloud computing, data privacy has become one of critical security issues and attracted much attention as more and more mobile devices are relying on the services in cloud. To protect data privacy, users usually encrypt their sensitive data before uploading to cloud servers, which renders the data utilization to be difficult. The ciphertext retrieval is able to realize utilization over encrypted data and searchable public key encryption is an effective way in the construction of encrypted data retrieval. However, the previous related works have not paid much attention to the design of ciphertext retrieval schemes that are secure against inside keyword-guessing attacks (KGAs). In this paper, we first construct a new architecture to resist inside KGAs. Moreover we present an efficient ciphertext retrieval instance with a designated tester (dCRKS) based on the architecture. This instance is secure under the inside KGAs. Finally, security analysis and efficiency comparison show that the proposal is effective for the retrieval of encrypted data in cloud computing.
APA, Harvard, Vancouver, ISO, and other styles
6

Ping, Yuan, Wei Song, Zhili Zhang, Weiping Wang, and Baocang Wang. "A Multi-Keyword Searchable Encryption Scheme Based on Probability Trapdoor over Encryption Cloud Data." Information 11, no. 8 (August 12, 2020): 394. http://dx.doi.org/10.3390/info11080394.

Full text
Abstract:
With the rapid development of cloud computing, massive data are transferred to cloud servers for storage and management savings. For privacy concerns, data should be encrypted before being uploaded. In the encrypted-domain (ED), however, many data computing methods working in the plain-domain are no longer applicable. Data retrieval has become a significant obstacle to cloud storage services. To break through this limitation, we propose a multi-keyword searchable encryption scheme by introducing probability trapdoors. Firstly, a keywords probability trapdoor is established to ensure that the scheme can resist indistinguishable attacks. Based on the keywords trapdoor, we present the keywords vector to make the scheme realize multi-keyword search in the process of data retrieval in the ED. Both security and performance analysis confirm the advantages of the proposed scheme in terms of search functionality and complexity.
APA, Harvard, Vancouver, ISO, and other styles
7

Folasole, Adetayo, Oluwasegun Solomon Adegboye, Oluwaseun Isaiah Ekuewa, and Patience Emanre Eshua. "Security, Privacy Challenges and Available Countermeasures in Electronic Health Record Systems: A Review." European Journal of Electrical Engineering and Computer Science 7, no. 6 (November 13, 2023): 27–33. http://dx.doi.org/10.24018/ejece.2023.7.6.561.

Full text
Abstract:
Electronic Health Record (EHR) systems have revolutionized the healthcare industry by enabling the efficient storage, retrieval, and sharing of patient health information. However, the widespread adoption of EHR systems has also engendered a myriad of privacy and security challenges that must be spoke to guarantee the privacy, integrity, and accessibility of sensitive patient evidence. A range of countermeasures has been implemented to reduce the risks associated with EHR data privacy and security. These include contact switch tools that limit data access to approved operators, as well as advanced encryption methods like Identity-Based Encryption and Attribute-Based Encryption, specifically tailored for securing EHR data in cloud environments. By employing these protective measures, healthcare providers can enhance the safety of sensitive patient information while adapting to the dynamic digital landscape.
APA, Harvard, Vancouver, ISO, and other styles
8

Zhang, Qiuyu, Minrui Fu, Yibo Huang, and Zhenyu Zhao. "Encrypted Speech Retrieval Scheme Based on Multiuser Searchable Encryption in Cloud Storage." Security and Communication Networks 2022 (March 30, 2022): 1–14. http://dx.doi.org/10.1155/2022/9045259.

Full text
Abstract:
In order to solve the problem of multiuser security sharing and privacy protection of the speech data in cloud storage and realize efficient encrypted speech retrieval, an encrypted speech retrieval scheme based on multiuser searchable encryption was proposed. Firstly, the ciphertext-policy attribute-based encryption (CP-ABE) and searchable encryption (SE) are combined to support a multiuser searchable speech encryption scheme, which achieves the encryption and fine-grained access control of the speech data. Secondly, the Mel frequency cepstral coefficient (MFCC) feature of the original speech that is used as the input of the long- and short-term memory network (LSTM) is extracted to perform the deep semantic feature extraction as the speech keywords. Finally, the speech keywords are encrypted to generate a secure index, bound together with the encrypted speech, and then stored in the cloud. During the user retrieving, the keywords of query speech are extracted by utilizing the trained LSTM to generate the search trapdoor of the user and then uploaded to the cloud server, and the Euclidean distance is used for matching the security index with the search trapdoor. In addition, a proxy server is introduced to execute the partial ciphertext decryption operations to reduce computation overhead and storage space. The theoretical analysis and experimental results show that the proposed scheme has higher security and retrieval accuracy and can realize the secure storage of the massive speech data and multiuser data sharing.
APA, Harvard, Vancouver, ISO, and other styles
9

Li, Weijing, Zicheng Zhou, Wen Fan, and Juan Gao. "Design of Data Sharing Platform Based on Blockchain and IPFS Technology." Wireless Communications and Mobile Computing 2022 (July 13, 2022): 1–7. http://dx.doi.org/10.1155/2022/3937725.

Full text
Abstract:
With the continuous development of the information age, data sharing and exchange are gradually increasing. The Internet and big data technology provide a guarantee for data sharing and transmission. At present, as the amount of data increases rapidly, how to realize data sharing has become a huge challenge. To solve this problem, this paper proposes a data sharing platform based on the combination of blockchain and interplanetary file system (IPFS) technology to solve the data sharing and storage. Firstly, by constructing the alliance blockchain, the consensus mechanism of computing power competition is used to maintain the data written into the blockchain, and the IPFS data storage system is established to store data using distributed storage, file splitting, and splicing technologies. Secondly, a data sharing platform composed of blockchain module, IPFS module, encryption and decryption module, and fast retrieval module is built. Data encryption is processed by encryption and decryption module, and the processed data is uploaded to THE IPFS module; the abstract and other information are finally written into the blockchain through the blockchain module. The fast retrieval module can quickly locate the required data according to the retrieval conditions in the mass blockchain data; finally, the security and storage of data sharing platform are guaranteed through security and performance evaluation. The research results solve the problem of large amount of data sharing, realize the data decentralization, and ensure the data storage security.
APA, Harvard, Vancouver, ISO, and other styles
10

Taipalus, Toni, Hilkka Grahn, Hannu Turtiainen, and Andrei Costin. "Utilizing Vector Database Management Systems in Cyber Security." European Conference on Cyber Warfare and Security 23, no. 1 (June 21, 2024): 560–65. http://dx.doi.org/10.34190/eccws.23.1.2220.

Full text
Abstract:
The rising popularity of phenomena such as ubiquitous computing and IoT poses increasingly high demands for data management, and it is not uncommon that database management systems (DBMS) must be capable of reading and writing hundreds of operations per second. Vector DBMSs (VDBMS) are novel products that focus on the management of vector data and can alleviate data management pressures by storing data objects such as logs, system calls, emails, network flow data, and memory dumps in feature vectors that are computationally efficient in both storage and information retrieval. VDMBSs allow efficient nearest neighbour similarity search on complex data objects, which can be used in various cyber security applications such as anomaly, intrusion, malware detection, user behaviour analysis, and network flow analysis. This study describes VDBMSs and some of their use cases in cyber security.
APA, Harvard, Vancouver, ISO, and other styles
11

Gatkal, Suyog, Vinayak Dhage, Dhanashree Kalekar, and Sanket Ghadge. "Survey on Medical Data Storage Systems." International Journal of Soft Computing and Engineering 11, no. 1 (September 30, 2021): 44–48. http://dx.doi.org/10.35940/ijsce.a3528.0911121.

Full text
Abstract:
Nowadays digital data storage and digital communication are widely used in the healthcare sector. Since data in the digital form significantly easier to store, retrieve, manipulate, analyses, and manage. Also, digital data eliminate the threat of data loss considerably. These advantages pushing many hospitals to store their data digitally. But, as the patients reveal their private and important information to the doctor, it is very crucial to maintain the privacy, security, and reliability of the healthcare data. In this process of handling the data securely, several technologies are being used like cloud storage, data warehousing, blockchain, etc. The main aim of this survey is to study the different models and technologies in the healthcare sector and analyses them on different parameters like security, privacy, performance, etc. This study will help the new developing healthcare systems to choose appropriate technology and approach to build a more efficient, robust, secure, and reliable system.
APA, Harvard, Vancouver, ISO, and other styles
12

Hamid, Yasir, Rameez Yousuf, and Atif Chowhan. "Security in Health Information Management Records through Blockchain Technology." Journal of Information Security and Cybercrimes Research 6, no. 1 (June 30, 2023): 24–39. http://dx.doi.org/10.26735/qbij3667.

Full text
Abstract:
Medical records play a crucial role in delivering high-quality healthcare by facilitating accurate diagnosis, treatment, and patient monitoring. However, manual, paper-based record-keeping systems present various challenges, including storage burden and retrieval difficulties. Although electronic medical records (EMRs) have gained popularity, they are not risk-free, such as data manipulation. Inadequate medical records administration contributes to inefficiencies in the healthcare system, increased costs, incorrect diagnoses, and compromised patient care. This literature review investigates the potential of blockchain technology in enhancing medical record management and improving the quality, efficiency, and limitations associated with traditional manual methods. Specifically, the study explores the benefits of utilizing blockchain in medical records management. The findings suggest that blockchain technology can enhance the security, interoperability, and accessibility of medical records thereby mitigating concerns related to data manipulation while providing a more cost-effective and efficient solution for medical records management.
APA, Harvard, Vancouver, ISO, and other styles
13

Rashid, Mustafa Noori, Leith Hamid Abed, and Waleed Kareem Awad. "Financial information security using hybrid encryption technique on multi-cloud architecture." Bulletin of Electrical Engineering and Informatics 11, no. 6 (December 1, 2022): 3450–61. http://dx.doi.org/10.11591/eei.v11i6.3967.

Full text
Abstract:
One of the most severe issues in the cloud is security. In comparison to financial data, so it is extremely sensitive and must be safeguarded against unwanted access. We have developed a proposed system based on three different keys. We divided the data into insensitive, sensitive, and highly sensitive data. The data will be saved on a separate cloud server. The proposed system used different keys for encryption and decryption purposes. The elliptic curve cryptography (ECC) based distributed cloud-based secure data storage (DDSPE) approach was proposed to provide secure large data based data protection across the different clouds. With DDSPE technology, the ECC scheme has been used for encryption and decryption purposes. The cloud is used for simulation. The results of the tests reveal that the suggested DDSPE system is safe and saves time regarding data retention and retrieval. To analyze performance, we compared the DDSPE method with advance encryption standard (AES), blowfish, rivest shamir adleman (RSA), security-aware efficient distributed storage (SA-EDS), and attribute based encryption (ABE) based secure distributed storage (ASDSS). In terms of information retention and recovery, our methodology is quite effective because it requires less amount of time as compared to other strategies.
APA, Harvard, Vancouver, ISO, and other styles
14

Gupta, Daya Sagar, and G. P. Biswas. "Secure Computation on Cloud Storage." Journal of Cases on Information Technology 17, no. 3 (July 2015): 22–29. http://dx.doi.org/10.4018/jcit.2015070103.

Full text
Abstract:
This paper describes a way by which computation on cloud storage is securely possible. A user stores their secret (encrypted) files on cloud storage and later on, retrieves an addition of their original files, however, the cloud system cannot decrypt the stored encrypted files by own. In this paper, the authors use the homomorphic property to securely compute the addition of the files. The implementation of their proposed protocol is based on the computation on the basic properties of elliptic curves and bilinear mapping. The security of proposed encryption technique depends on the hardness of elliptic curve operations.
APA, Harvard, Vancouver, ISO, and other styles
15

Zhou, Wenbo. "MSCFS-RP: A Colored-Petri-Net-Based Analysis Model for Master–Slave Cloud File Systems with Replication Pipelining." Electronics 13, no. 14 (July 19, 2024): 2852. http://dx.doi.org/10.3390/electronics13142852.

Full text
Abstract:
As a typical information system, a cloud file system enables the storage, retrieval, and management of data on remote servers or server clusters. The reliable design of such systems is critical to ensure the security of data and availability of services. However, designing correct-by-construction systems is challenging due to the complexity of and concurrency inherent in cloud file systems. Further, existing works on cloud file system analysis often focus on specific systems or lack formal modeling and verification, leading to potential design flaws and security vulnerabilities. To address these issues, we propose MSCFS-RP, which is a formal analysis model based on colored Petri nets. Leveraging the strengths of colored Petri nets in representing diverse information types with colored tokens and defining explicit rules for concurrent interactions, our model captures the writing and reading processes of clients, meta servers, and clusters. With strong formalism and support for verification using CPN Tools, we rigorously evaluate key properties such as replication consistency under various scenarios. The results demonstrate that MSCFS-RP satisfies these properties, validating its effectiveness and trustworthiness in managing information within cloud storage systems.
APA, Harvard, Vancouver, ISO, and other styles
16

Alsudani, Mustafa Qahtan, Hassan Falah Fakhruldeen, Heba Abdul-Jaleel Al-Asady, and Feryal Ibrahim Jabbar. "Storage and encryption file authentication for cloud-based data retrieval." Bulletin of Electrical Engineering and Informatics 11, no. 2 (April 1, 2022): 1110–16. http://dx.doi.org/10.11591/eei.v11i2.3344.

Full text
Abstract:
The amount of data that must be processed, stored, and modified rises as time passes. An enormous volume of data from a wide range of sources must be stored on a safe platform. Maintaining such a large volume of data on a single computer or hard drive is impracticable. As a result, the cloud is the ideal platform for storing any quantity of data. An advantage of storing data in the cloud is that it may be accessed at any time and from any device. However, the security of data stored in the cloud is a big concern. Because of this, despite the benefits, most users are reluctant to move their papers to the cloud. The data should be encrypted before sending it off to the cloud service provider to avoid this issue. It's a great way to increase the security of your papers. According to a new technique presented in the system, data may be searched across encrypted files without compromising the privacy and security of various data owners. Implementing the pallier homomorphic encryption method makes it possible to perform computations on encrypted data without decryption.
APA, Harvard, Vancouver, ISO, and other styles
17

Shyam, Shyam, Pankaj Kumar, Rajeev Shrivastava, Satyabrata Jena, Tushar Kumar Pandey, and Ankita Nigam. "Innovations in Cyber Security Algorithms for Databases Enhancing Data Retrieval and Management." Journal of Cybersecurity and Information Management 13, no. 2 (2024): 191–98. http://dx.doi.org/10.54216/jcim.130215.

Full text
Abstract:
The term Innovations in Cyber Security Algorithms for Databases Enhancing Data Retrieval and Management refers to a book that studies novel techniques for tackling problems related to digital data. The integration of three complicated methods—DQO, DSS, and RAI—is the major focus of attention in this piece of writing. DQO makes use of machine learning to optimize query processing on the fly to meet fluctuating workloads. This is done to accommodate such workloads. To address issues pertaining to the scale of distributed systems, distributed storage systems (DSS) convey data in an effective manner by utilizing consistent hashing. The RAI algorithm adjusts the index architecture in response to the query patterns to achieve real-time flexibility. In this way, the process of looking for information that is frequently asked about is sped up. The methodology that has been suggested is superior to six different ways that are often used in terms of its adaptability, scalability, and real-time capabilities. This article will give a thorough model for improving data management in computer systems. The objective of this essay is to present the model.
APA, Harvard, Vancouver, ISO, and other styles
18

Al-Mayali, Yahya Mahdi Hadi, and Zahraa Yahya Mahdi Al-Mayali. "Digitization, and Coding, with Optimizing, of Iraqi Personnel Home Addresses forward, minimizing Storage Space, and Processing time." BIO Web of Conferences 97 (2024): 00028. http://dx.doi.org/10.1051/bioconf/20249700028.

Full text
Abstract:
Individual Home Address is considered as an important sub set of attributes, and never find personnel record, whether a person is student, patient, or employee, etc. without having a home address. It is required to be recorded, registered, and documented in all personnel information systems, whether the system is manual or computerized. This research concern on the Coding, and Digitization of home address of Iraqi personnel in order to enhancing storage efficiency and reduce processing time. The conventional method of maintaining paper-based records for personnel home addresses has proven to be costly, and timeconsuming, and in most cases inefficient. The proposed solution involves the conversion of physical addresses into digital formats, allowing for streamlined data storage and faster retrieval, and update processes. The work starting by indicate the current challenges related to the paper-based address systems, including the demands on physical storage space and the delays incurred during information retrieval. Subsequently, it explores the potential benefits of digitizing home addresses, such as reduced storage requirements, improved data accessibility, and enhanced overall organizational efficiency. To implement this digitization process, the research investigates various technological solutions, including geographic information systems (GIS), databases, and data management protocols. The study also addresses potential concerns related to data security and privacy, proposing measures to safeguard sensitive information. The proposed solution for Digitization, Coding, with Optimizing the Personnel Home Address provide at least 85% of Optimizing Factor for each individual personnel record required storage space and processing time, this solution subsequently leed to better daily decision-making process in most business organizations.
APA, Harvard, Vancouver, ISO, and other styles
19

Mishari Abdullah, AL Ajery,, Thamari, Abdullah Ali, Al Malki, Faisal Hamed, Khormi, Ahmed Abdu, and Al Farshan, Salem Mohammed. "THE EVOLUTION OF MEDICAL INFORMATION MANAGEMENT: PAST, PRESENT, AND FUTURE PERSPECTIVES." EPH - International Journal of Medical and Health Science 8, no. 2 (June 11, 2022): 22–30. http://dx.doi.org/10.53555/eijmhs.v8i2.181.

Full text
Abstract:
Medical Information Management (MIM) oversees the collection, storage, retrieval, and utilization of healthcare data. Historically, MIM relied on manual record-keeping, which shifted to standardized forms in the early 20th century. The digital revolution in the late 20th century introduced Electronic Health Records (EHRs), streamlining data sharing and storage. As EHRs proliferated, interoperability became vital, leading to Health Information Exchanges. However, digital records also posed challenges in data security, prompting regulations like HIPAA. Presently, the integration of AI and big data in MIM offers diagnostic support and personalizes patient care. Future projections suggest global health data integration, but with this come ethical dilemmas, especially concerning AI's role in healthcare. This evolution from rudimentary records to sophisticated, interconnected systems exemplifies technological advancement in healthcare, emphasizing the balance between innovation and ethical considerations.
APA, Harvard, Vancouver, ISO, and other styles
20

N. Mhawi, Doaa, Haider W. Oleiwi, and Heba L. Al-Taie. "Generating Encrypted Document Index Structure Using Tree Browser." Journal of Techniques 5, no. 2 (June 26, 2023): 114–22. http://dx.doi.org/10.51173/jt.v5i2.948.

Full text
Abstract:
The document indexing process aims to store documents in a manner that facilitates the process of retrieving specific documents efficiently in terms of accuracy and time complexity. Many information retrieval systems encounter security issues and execution time to retrieve relevant documents. In addition, these systems lead to ample storage. Therefore, it requires combining confidentiality with the indexed document, and a separate process is performed to encrypt the documents. Hence, a new indexing structure named tree browser (TB) was proposed in this paper to be applied to index files of the large document set in an encrypted manner. This method represents the keywords in a variable-length binary format before being stored in the index. This binary format provides additional encryption to the information stored and reduces the index size. The proposed method (TB) is applied to the WebKB dataset. This dataset is related to web page documents (semi-structured documents). The experimental results demonstrated that the storage size is reduced by using TB-tree to 48.5 MB, while the traditional index is 307 MB.
APA, Harvard, Vancouver, ISO, and other styles
21

Ding, Yong, Hui Xu, Yujue Wang, Fang Yuan, and Hai Liang. "Secure Multi-Keyword Search and Access Control over Electronic Health Records in Wireless Body Area Networks." Security and Communication Networks 2021 (September 29, 2021): 1–11. http://dx.doi.org/10.1155/2021/9520941.

Full text
Abstract:
Wireless body area network (WBAN) consists of a number of sensors that are worn on patients to collect dynamic e-health records (EHRs) and mobile devices that aggregate EHRs. These EHRs are encrypted at mobile devices and then uploaded to the public cloud for storage and user access. To share encrypted EHRs with users effectively, help users retrieve EHRs accurately, and ensure EHRs confidentiality, a secure multi‐keyword search and access control (SMKS-AC) scheme is proposed, which implements encrypted EHRs access control under the ciphertext-policy attribute-based encryption (CP-ABE). SMKS-AC provides multi‐keyword search for accurate EHRs retrieval, supports the validation of decrypted EHRs, and traces and revokes the identity of users who leak private key. Security analysis shows that SMKS-AC is secure against chosen keyword and chosen plaintext attacks. Through theoretical analysis and experimental verification, the proposed SMKS-AC scheme requires less storage resources and computational costs on mobile devices than existing schemes.
APA, Harvard, Vancouver, ISO, and other styles
22

Maosa, Herbert, Karim Ouazzane, and Viktor Sowinski-Mydlarz. "Real-Time Cyber Analytics Data Collection Framework." International Journal of Information Security and Privacy 16, no. 1 (January 1, 2022): 1–10. http://dx.doi.org/10.4018/ijisp.311465.

Full text
Abstract:
In cyber security, it is critical that event data is collected in as near real time as possible to enable early detection and response to threats. Performing analytics from event logs stored in databases slows down the response time due to the time cost of database insertion and retrieval operations. The authors present a data collection framework that minimizes the need for long-term storage. Events are buffered in memory, up to a configurable threshold, before being streamed in real time using live streaming technologies. The framework deploys virtualized data collecting agents that ingest data from multiple sources including threat intelligence. The framework enables the correlation of events from various sources, improving detection precision. The authors have tested the framework in a real time, machine-learning-based threat detection system. The results show a time gain of 300 milliseconds in transmission time from event capture to analytics system, compared with storage-based collection frameworks. Threat detection was measured at 95%, which is comparable to the benchmark snort IDS.
APA, Harvard, Vancouver, ISO, and other styles
23

Santiañez, Reymon M., and Benedict M. Sollano. "Development and Evaluation of Local Area Network Based Archiving System." American Journal of Agricultural Science, Engineering and Technology 5, no. 2 (November 29, 2021): 286–96. http://dx.doi.org/10.54536/ajaset.v5i2.107.

Full text
Abstract:
The goal of this study was to create the Local Area Network Based Archiving System, a cross-platform development system for electronic information storage, security, preservation, and retention. The system incorporates capabilities such as data storage for long-term preservation and retrieval, file searching and retrieval, security features such as user account information system and account access privilege levels, and an email-like messaging system. The researchers developed the Local Area Network Based Archiving System using the Agile Software Development Methodology to keep up with the stakeholders' ever-changing needs. After each iteration of the work cycle, this methodology employs a process of frequent feedback. Features are added or refined in each iteration to ensure that the study meets its goals and expectations. The developed system received an overall average weighted mean of 4.53 in the evaluation summary, which is considered excellent. The strongest point of the system, according to the respondents' responses, was its content, which received the highest average mean among the five major categories in the system evaluation. The system's mobile responsiveness was a huge plus, as it considerably aided accessibility. The system should also be deployed, according to the respondents, because it will provide a powerful answer to the ongoing challenges with storing, managing, securing, and retrieving electronic files. As a result, the researchers concluded that a Local Area Network Based Archiving System is required for the efficient operation of an electronic file storage system. Having centralized electronic file storage and retrieval system not only saves time and money in the long run but also allows for disaster recovery and business continuity.
APA, Harvard, Vancouver, ISO, and other styles
24

Budati, Anil Kumar, Sridhar Reddy Vulapula, Syed Bilal Hussian Shah, Anas Al-Tirawi, and Anil Carie. "Secure Multi-Level Privacy-Protection Scheme for Securing Private Data over 5G-Enabled Hybrid Cloud IoT Networks." Electronics 12, no. 7 (March 30, 2023): 1638. http://dx.doi.org/10.3390/electronics12071638.

Full text
Abstract:
The hybrid cloud is a secure alternative for enterprises to exploit the benefits of cloud computing to overcome the privacy and security concerns of data in IoT networks. However, in hybrid cloud IoT, sensitive items such as keys in the private cloud can become compromised due to internal attacks. Once these keys are compromised, the encrypted data in the public cloud are no longer secure. This work proposes a secure multilevel privacy-protection scheme based on Generative Adversarial Networks (GAN) for hybrid cloud IoT. The scheme secures sensitive information in the private cloud against internal compromises. GAN is used to generate a mask with the input of sensory data-transformation values and a trapdoor key. GAN’s effectiveness is thoroughly assessed using Peak Signal-to-Noise Ratio (PSNR), computation time, retrieval time, and storage overhead frameworks. The obtained results reveal that the security scheme being proposed is found to require a negligible storage overhead and a 4% overhead for upload/retrieval compared to the existing works.
APA, Harvard, Vancouver, ISO, and other styles
25

Lazim Lafta, Ali, and Ayad I. Abdulsada. "SMPP-CBIR: shorted and mixed aggregated image features for privacy-preserving content-based image retrieval." Bulletin of Electrical Engineering and Informatics 11, no. 5 (October 1, 2022): 2930–37. http://dx.doi.org/10.11591/eei.v11i5.4323.

Full text
Abstract:
Thanks to recent breakthroughs in photographic and digital technology, enormous amounts of image data are generated daily. Many content-based image retrieval (CBIR) systems have been developed for searching image collections. However, these systems need more computer and storage resources that can be met by cloud servers, since they supply a lot of processing power at a reasonable price. The protection of users' personal information is a worry for image owners since cloud services are not exactly trustworthy. In this paper, we suggest and put into practice a CBIR (SMPP-CBIR) technique for searching and retrieving ciphertext information that protects security. Asymmetric scalar-product-preserving encryption process (ASPE) is used to preserve aggregated mixed feature vectors while still enabling computation between them to describe the related picture collection. The k-means clustering algorithm is used to recursively arrange all encrypted attributes into a tree index in order to speed up search times. The findings show that SMPP-CBIR is more scalable, more precise, and faster in indexing and retrieval than earlier systems.
APA, Harvard, Vancouver, ISO, and other styles
26

Du, Haorui, Jianhua Chen, Fei Lin, Cong Peng, and Debiao He. "A Lightweight Blockchain-based Public-Key Authenticated Encryption with Multi-Keyword Search for Cloud Computing." Security and Communication Networks 2022 (October 15, 2022): 1–15. http://dx.doi.org/10.1155/2022/2309834.

Full text
Abstract:
Cloud computing can provide users with sufficient computing resources, storage, and bandwidth to meet their needs. Data security and privacy protection are among the new threats faced by users. Searchable encryption is the combination of search technology and encryption technology. Searchable encryption can upload the user’s data to the cloud server after special encryption, and can realize the function of retrieving according to keywords. Comparatively to symmetric searchable encryption (SSE), public key searchable encryption (PEKS) simplifies key management greatly. However, most existing public key authenticated encryption with keyword search (PAEKS) schemes are based bilinear pairing, making them computationally expensive. Apart from this, complex retrieval requirements and the integrity of the results had not been considered. To address these problems, we propose a blockchain-based PAEKS schemes supporting multi-keyword queries and integrity verification. In addition, we provide security proofs for the PAEKS scheme under the decisional oracle Diffie-Hellman (DODH) assumption. This scheme a scheme that requires less storage and computational power than other schemes of the same kind.
APA, Harvard, Vancouver, ISO, and other styles
27

Abida Khanam. ""Ensuring Security in Electronic Health Records: Implementing and Validating a Blockchain and IPFS Framework"." Journal of Electrical Systems 20, no. 7s (May 4, 2024): 2356–68. http://dx.doi.org/10.52783/jes.3972.

Full text
Abstract:
The rapid advancement of information technology has completely transformed the healthcare sector, demanding creative solutions to tackle a wide range of challenges. Electronic Health Records (EHR) are essential in contemporary healthcare systems, enabling the storage, retrieval, and sharing of data about patients among healthcare providers. Ensuring the confidentiality and safety of EHR data is a major challenge because of the sensitive nature of health-related information and the growing number of cyber threats. Our paper introduces a new framework for enhancing the security of Electronic Health Records by leveraging the use of blockchain technology and the Inter Planetary File System (IPFS). The framework utilizes the immutability and decentralized nature of blockchain to guarantee data integrity and audibility, while IPFS offers a distributed and resistant tamp storing solution for data stored off-chain. Explaining the structure of our proposed framework, which involves combining blockchain and IPFS components, and examining how it tackles important security and privacy issues in EHR systems. Furthermore, a demonstration of the framework's implementation is provided, along with an assessment of its performance, scalability, and security aspects. The study illustrates the potential and success of utilizing blockchain and IPFS to secure Electronic Health Records, leading to improved data security and compatibility in healthcare systems.
APA, Harvard, Vancouver, ISO, and other styles
28

Kumar Barai, Dilip, G. Sridevi, Syed Umar, and MSR Prasad. "Information Base Security Threats and Challenges' in Information Forensic: A Survey." Indonesian Journal of Electrical Engineering and Computer Science 1, no. 2 (February 1, 2016): 406. http://dx.doi.org/10.11591/ijeecs.v1.i2.pp406-410.

Full text
Abstract:
<p>Generally to store the information or Information of any organization then they will be maintain Information base to manage that Information base we use some management techniques like Information base management systems so called DBMS. In this paper we introduced Relational DBMS which is a collection of applications that can store various information which can be easily retrieve, manipulate and storage of Information. So in this we are concentrating on forensic analysis and Information base of it which is very sensitive Information. In this paper we are analyzing and surveying of forensic Information based using various methodologies with different tools and algorithms for investigations, through which we got what are the challenges are facing in the forensic Information bases since the years.</p>
APA, Harvard, Vancouver, ISO, and other styles
29

Mei, Zhuolin, Jing Yu, Jinzhou Huang, Bin Wu, Zhiqiang Zhao, Caicai Zhang, Jiaoli Shi, Xiancheng Wang, and Zongda Wu. "Secure Cloud Storage and Retrieval of Personal Health Data From Smart Wearable Devices With Privacy-Preserving Techniques." International Journal of Web Services Research 20, no. 1 (October 5, 2023): 1–18. http://dx.doi.org/10.4018/ijwsr.331388.

Full text
Abstract:
With the increasing awareness of personal health, personal health data management has become an important part of people's lives. Smart wearable devices (SWDs) collect people's personal health data, and then store the data on cloud. Authorized entities access the data to provide personalized health services. However, these personal health data contain a large amount of sensitive information, which may pose a significant threat to people's lives and property. To address this, this paper proposes a privacy-preserving solution. SWD data is encrypted, and secure indexes are created using Bloom filter and 0-1 encoding. Encrypted data and indexes are stored in a semi-trusted cloud. Only authorized entities can access the ciphertexts, ensuring secure personalized health management. Extensive experiments validate the scheme's efficiency in index construction, query token generation, and ciphertext search. Security analysis confirms no external entity, including the cloud, gains additional information during retrieval.
APA, Harvard, Vancouver, ISO, and other styles
30

D. Rajalakshmi, Et al. "HealthBlock: A Blockchain-IoT Fusion for Secure Healthcare Data Exchange." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 9 (November 5, 2023): 2018–23. http://dx.doi.org/10.17762/ijritcc.v11i9.9199.

Full text
Abstract:
Managing healthcare data while ensuring its security and privacy is critical to providing quality care to patients. However, traditional approaches to healthcare data sharing have limitations, including the risk of data breaches and the lack of privacy-preserving mechanisms. This research paper proposes a novel hybrid blockchain-IoT approach for privacy-preserving healthcare data sharing that addresses these challenges. Our system incorporates a private blockchain for protected and tamper-proof data sharing, with privacy-preserving techniques such as differential privacy and homomorphic encryption to protect patient data. IoT devices are utilized to collect and transmit real-time data, equipped with privacy-preserving mechanisms such as data anonymization and secure transmission protocols. Our approach achieved an accuracy rate of 98% for access control and a 99.6% success rate for data privacy protection. Furthermore, our proposed system demonstrated improved data storage and retrieval performance, with a data storage overhead reduction of up to 86% and a data retrieval time reduction of up to 81%. These results indicate the potential of our approach to enhance the security, privacy, and efficiency of healthcare data management, contributing to improved patient care outcomes.
APA, Harvard, Vancouver, ISO, and other styles
31

Jain, Paras, Sunita Dwivedi, Adel R. Alharbi, R. Sureshbabu, Devesh Pratap Singh, Sajjad Shaukat Jamal, and Daniel Krah. "Blockchain-Enabled Smart Surveillance System with Artificial Intelligence." Wireless Communications and Mobile Computing 2022 (May 6, 2022): 1–9. http://dx.doi.org/10.1155/2022/2792639.

Full text
Abstract:
Through the use of blockchain technology, sensitive information may be securely communicated without the need to replicate it, which can assist in decreasing medical record mistakes and saving time by eliminating the need to duplicate information. Furthermore, the information is timestamped, which further enhances the security of the data even further. The deployment of blockchain technology in a range of healthcare situations may enhance the security and efficiency of payment transactions. In this way, only those who have been allowed access to patient medical information can see or modify such information. It is proposed in this study that blockchain technology be used to provide an accessible data storage and retrieval mechanism for patients and healthcare professionals in a healthcare system that is both safe and efficient. As of 1970, a variety of traditional knowledge-based approaches such as Personal Identification Recognition Number (PIRN), passwords, and other similar methods have been made available; however, many token-based approaches such as drivers’ licenses, passports, credit cards, bank accounts, ID cards, and keys have also been made available; however, they have all failed to establish a secure and reliable transaction channel. Because they are easily misplaced, stolen, or lost, they are usually unable to protect secrecy or authenticate the identity of a legitimate claimant. Aside from that, personally identifiable information such as passwords and PINs is very prone to fraud since they are easily forgotten or guessed by an imposter. Biometric identification and authentication (commonly known as biometrics) are attracting a great deal of attention these days, particularly in the realm of information security systems, due to its inherent potential and advantages over other conventional ways for identifying and authenticating. As a result of the device’s unique biological characteristics, which include features such as fingerprints, facepalms, hand geometry (including the iris), and the device’s iris, it can be used in a variety of contexts, such as consumer banking kiosks, airport security systems, international ports of entry, universities, office buildings, and forensics, to name a few. It is also used in several other contexts, including forensics and law enforcement. Consequently, every layer of the system—sensed data, computation, and processing of data, as well as the storage and administration of data—is susceptible to a broad variety of threats and weaknesses (cloud). There does not seem to be any suitable methods for dealing with the large volumes of data created by the fog computing architecture when normal data storage and security technologies are used. Because of this, the major objective of this research is to design security countermeasures against medical data mining vulnerabilities that originate from the sensing layer and data storage in the Internet of Things’ cloud database, both of which are discussed in more depth further down. A key allows for the creation of a distributed ledger database and provides an immutable security solution, transaction transparency, and the prohibition of tampering with patient information. This mechanism is particularly useful in healthcare settings, where patient information must be kept confidential. When used in a hospital environment, this method is extremely beneficial. As a result of incorporating blockchain technology into the fog paradigm, it is possible to alleviate some of the current concerns associated with latency, centralization, and scalability.
APA, Harvard, Vancouver, ISO, and other styles
32

Thigale, Satyam R. "Multiple Keyword Search in Cloud Data." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 04 (April 9, 2024): 1–5. http://dx.doi.org/10.55041/ijsrem30422.

Full text
Abstract:
Cloud computing is often regarded as a great innovation due to the increasing demand for endless storage space and reliable retrieval services. Several works have been developed on ranked multi-keyword search over cloud data with numerous data owners concerned about privacy. However, most of these methods can be broken by a clever attacker using a combination of a keyword guess and an equivalency test. Also, when searching across data from many data owners, they can't reliably return the top k results to the users. The unreliability of search results and the potential for the exposure of critical keyword information are two obvious drawbacks. To address this issue, we first propose a novel efficient ranked multi-keyword retrieval scheme with keyword privacy for multiple data owners, allowing the cloud server to perform multikeyword search over the cloud data and then return the top-k ranked search results to data users without leaking any keyword and trapdoor information. Furthermore, we demonstrate through stringent security analysis that our method is safe from both internal and external threats. Finally, the results of the performance evaluation show that our scheme outperforms other ranked multi-keyword search systems. Keywords: cloud computing, multi-keyword retrieval, multiple data owner model, privacy sensitive, ranked.
APA, Harvard, Vancouver, ISO, and other styles
33

FATIEIEVA, Anastasiia. "Information systems in the enterprise's management." Economics. Finances. Law, no. 6/1 (June 26, 2020): 11–15. http://dx.doi.org/10.37634/efp.2020.6(1).2.

Full text
Abstract:
The article examines the features of the use of modern information systems and technologies in the activities of enterprises in order to increase the efficiency of management decisions. Based on a study of modern corporate practices in the global financial market, it is proved that corporate information systems for the management of medium and large enterprises is a necessary tool to minimize costs and increase profitability. The purpose of the article is to research the features of modern information systems and technologies using in activity of the enterprises for the purpose of increase of efficiency of administrative decisions. Information system as a set of organizational and technical means for storing and processing information in order to meet the information needs of users, which provides the collection, retrieval, processing and transmission of information. To solve the existing problems of corporate information systems development, an algorithm of actions to increase the level of informatization and efficiency of corporations, which will address current issues of corporate information systems, taking into account domestic legislation and features of corporate governance, increase efficiency and transparency of business processes and provide centralized support for management decisions. at all levels and in all areas of business companies. It is emphasized that one of the main properties of information systems is divisibility into subsystems, which has scales in terms of its development and operation. The stages of creation and functioning (life cycle) of information are specified. It is proved that the use of information systems is a prerequisite for a modern enterprise, that will promote the adoption of sound strategic management decisions aimed at increasing competition (capacity and strengthening the economic security of the enterprise. An effective area for improvement management of the enterprise is implemented modern information systems and technologic, which makes it possible to increase the speed,quality and reliability of collection, storage and information processing; significantly reduce management line staff of the enterprise, which there is preparation of information for the form management decisions; print in the right time management and administration line staff of the enterprise of high-quality other formation; timely and efficient analysis and forecasting of economic activity under receptions; make decisions quickly and efficiently at all levels of enterprise management.
APA, Harvard, Vancouver, ISO, and other styles
34

Al-Mukhtar, Wijdan Noaman Marzoog. "Enhancing Data Security in Cloud Computing: A Comparative Analysis of Encryption Techniques." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 11 (November 30, 2023): 195–207. http://dx.doi.org/10.17762/ijritcc.v11i11.9306.

Full text
Abstract:
This research presents a novel and efficient public key cryptosystem known as the Enhanced Schmidt Samoa (ESS) cryptosystem, proposed to safeguard the data of a single owner in cloud computing environments. Data storage is a one-time process in the cloud, while data retrieval is a frequent operation. Experimental results demonstrate that the ESS cryptosystem offers robust data confidentiality in the cloud, surpassing the security provided by traditional cryptosystems. The research also introduces a secure cloud framework designed to accommodate both individuals and organizations accessing applications and data in the cloud. While individual users may generate and share data, organizations often involve multiple users in data sharing to support their business processes. In these scenarios, multi-user data ownership and access management become critical, requiring secure sharing of cryptographic keys among the authorized users. To address these issues and ensure data confidentiality in multi-user cloud environments, the Improved Secure Cloud Data Storage Framework (ISCDSF) is introduced. This research not only enhances data security but also provides a comprehensive framework for secure data sharing in the cloud, catering to the needs of both individual users and organizations.
APA, Harvard, Vancouver, ISO, and other styles
35

Gouveia Junior, Mário. "O pensamento de baumaniano e os paradigmas de mediação da informação." RDBCI: Revista Digital de Biblioteconomia e Ciência da Informação 13, no. 1 (January 30, 2015): 156. http://dx.doi.org/10.20396/rdbci.v13i1.1586.

Full text
Abstract:
Pretende verificar se a lógica baumanniana que trata do par de conceitos Liberdade e Segurança, no nas relações entre indivíduo e sociedade, pode ser aplicada às relações de mediação e custódia vivenciadas pelos Sistemas de Informação. Trata-se de uma revisão de literatura. Apresenta como resultados a perspectiva de que o emergente Paradigma Pós-custodial pode ser uma resposta ao dilema entre a preservação e o acesso à informação. Nesse sentido, a digitalização de conteúdos informacionais, naturalmente, seguidas de sua preservação em plataformas que se disponham a seguir padrões de armazenamento e recuperação de informação confiáveis pode representar a medida para que se possa obter o sucesso entre os pares de ambivalências paradigmáticas presentes nos serviços de mediação: custódia-acesso e segurança-liberdade de informação.AbstractIt is intended to verify Bauman`s theory, about the concepts Freedom and Security, regarding the relationship between individual and society, can be applied in relations of mediation and custody experienced by information systems. In methodological terms, it is about a literature review. As results is added that the prospect of the emerging paradigm Post-custodial can be an answer to the dilemma between preservation and acces to information. In that sense, scanning informational content, of course, followed by preservation on platforms that are willing to follow standards of reliable storage and retrieval of information may represent the extent to which one can obtain a success between pairs of paradigmatic present ambivalences in mediation services: custody-access and security-freedom of information.KeywordsInformation Systems. Security. Freedom. Paradigm Post-custodial.
APA, Harvard, Vancouver, ISO, and other styles
36

Jayathissa, Prabath, and Roshan Hewapathrana. "HAPI-FHIR Server Implementation to Enhancing Interoperability among Primary Care Health Information Systems in Sri Lanka: Review of the Technical Use Case." European Modern Studies Journal 7, no. 6 (February 1, 2024): 225–41. http://dx.doi.org/10.59573/emsj.7(6).2023.23.

Full text
Abstract:
This comprehensive review underscores the paramount importance of interoperability within the digital health landscape, emphasizing the necessity for a standardized framework to facilitate effective communication among healthcare professionals and institutions. The primary focus of this discourse centres on implementing a Fast Healthcare Interoperability Resources (FHIR) server, recognised as a pivotal solution addressing technical, semantic, and process interoperability failures. This standardised framework ensures uniformity and facilitates efficient communication and real-time data access within Primary Care Health Information Systems (HIS). The adaptability and scalability inherent in FHIR play a critical role in supporting the dynamic needs of healthcare systems, fostering interoperability, and enabling integration across diverse components. The narrative delves into the complexities of patient data management, accentuating the pivotal role of semantic interoperability in ensuring the seamless continuation of patient care. The transition from paper-based documentation to repository storage necessitates effective data retrieval through clinical correlation, emphasising presenting health data in a manner aligned with clinical findings—an innovative concept introduced as a health-aware presentation. Integrating FHIR standards amplifies these efforts, enriching multiple pathways for data search and retrieval. This interconnectedness not only fosters efficient interoperability within healthcare institutions but also facilitates a comprehensive approach to accessing health data across diverse organizations. The FHIR server implementation project, guided by the principles of the ADR method, systematically addresses challenges associated with patient identity criteria, biometrics, and data security, demonstrating a steadfast commitment to inclusive and patientcentric care. The detailed exploration of the development phases of the FHIR server implementation accentuates the significance of architecture design, API integration, and security measures. The concluding stages underscore a forward-looking approach, incorporating HHIMS Synthetic Dataset testing for future utilization. Ultimately, positioning the integration of an FHIR server in Primary Care HIS as a transformative step, this abstract envisions the fostering of a dynamic and responsive healthcare information environment harmonizing with the evolving landscape of digital health.
APA, Harvard, Vancouver, ISO, and other styles
37

Ye, Xubo, and Mababa Jonilo. "Unleashing the Power of Big Data: Designing a Robust Business Intelligence Framework for E-commerce Data Analytics." Journal of Information Systems Engineering and Management 8, no. 3 (November 29, 2023): 22638. http://dx.doi.org/10.55267/iadt.07.13946.

Full text
Abstract:
E-commerce companies are struggling to make use of the enormous amounts of data collected from diverse sources in the big data era. Designing and implementing a strong business intelligence (BI) framework that makes use of big data analytics is essential to overcoming this difficulty. The study examines how cloud computing affects mobile e-commerce, stressing its benefits for real-time data processing, scalability, and analysis. which boosts the competitiveness of Chinese e-commerce businesses. This study's goal is to deploy a comprehensive BI platform designed especially for e-commerce research to unleash the power of big data. Furthermore, the deployment of precision marketing techniques based on the RFM model and historical data analysis increases client segmentation, leading to targeted marketing efforts, greater customer happiness, and higher conversion rates. The major goal of this research is to equip e-commerce companies with the tools they need to take advantage of big data's potential and make decisions that will give them a competitive edge. Data storage, retrieval, and data mining are made possible by the integration of big data technologies, such as relational and distributed databases, along with parallelization via MapReduce. Ordinary, the findings of this newsletter spotlight the importance of embracing massive information technologies and methodologies in the e-trade sector. Leveraging cloud computing, records mining, and enterprise intelligence strategies can free up the capability of tremendous records assets, permitting enterprises to make informed choices, drive innovation, and gain a competitive facet. The paper highlights the value of security safeguards and risk assessment models in e-commerce systems, offering suggestions for spotting and reducing potential dangers and preserving the integrity of the system.
APA, Harvard, Vancouver, ISO, and other styles
38

Kumar, Sarvesh, Mohammed Abdul Wajeed, Rajashekhar Kunabeva, Nripendra Dwivedi, Prateek Singhal, Sajjad Shaukat Jamal, and Reynah Akwafo. "Novel Method for Safeguarding Personal Health Record in Cloud Connection Using Deep Learning Models." Computational Intelligence and Neuroscience 2022 (March 19, 2022): 1–14. http://dx.doi.org/10.1155/2022/3564436.

Full text
Abstract:
It is a new online service paradigm that allows consumers to exchange their health data. Health information management software allows individuals to control and share their health data with other users and healthcare experts. Patient health records (PHR) may be intelligently examined to predict patient criticality in healthcare systems. Unauthorized access, privacy, security, key management, and increased keyword query search time all occur when personal health records (PHR) are moved to a third-party semitrusted server. This paper presents security measures for cloud-based personal health records (PHR). The cost of keeping health records on a hospital server grows. This is particularly true in healthcare. As a consequence, keeping PHRs in the cloud helps healthcare institutions save money on infrastructure. The proposed security solutions include an optimized rule-based fuzzy inference system (ORFIS) to determine the patient’s criticality. Patients are classified into three groups (sometimes known as protective rings) based on their severity: very critical, less critical, and normal. In trials using the UCI machine learning archive, the new ORFIS outperformed existing fuzzy inference approaches in detecting the criticality of PHR. Using a graph-based access policy and anonymous authentication with a NoSQL database in a private cloud environment improves data storage and retrieval efficiency, granularity of data access, and response time.
APA, Harvard, Vancouver, ISO, and other styles
39

Wang, Miye, Sheyu Li, Tao Zheng, Nan Li, Qingke Shi, Xuejun Zhuo, Renxin Ding, and Yong Huang. "Big Data Health Care Platform With Multisource Heterogeneous Data Integration and Massive High-Dimensional Data Governance for Large Hospitals: Design, Development, and Application." JMIR Medical Informatics 10, no. 4 (April 13, 2022): e36481. http://dx.doi.org/10.2196/36481.

Full text
Abstract:
Background With the advent of data-intensive science, a full integration of big data science and health care will bring a cross-field revolution to the medical community in China. The concept big data represents not only a technology but also a resource and a method. Big data are regarded as an important strategic resource both at the national level and at the medical institutional level, thus great importance has been attached to the construction of a big data platform for health care. Objective We aimed to develop and implement a big data platform for a large hospital, to overcome difficulties in integrating, calculating, storing, and governing multisource heterogeneous data in a standardized way, as well as to ensure health care data security. Methods The project to build a big data platform at West China Hospital of Sichuan University was launched in 2017. The West China Hospital of Sichuan University big data platform has extracted, integrated, and governed data from different departments and sections of the hospital since January 2008. A master–slave mode was implemented to realize the real-time integration of multisource heterogeneous massive data, and an environment that separates heterogeneous characteristic data storage and calculation processes was built. A business-based metadata model was improved for data quality control, and a standardized health care data governance system and scientific closed-loop data security ecology were established. Results After 3 years of design, development, and testing, the West China Hospital of Sichuan University big data platform was formally brought online in November 2020. It has formed a massive multidimensional data resource database, with more than 12.49 million patients, 75.67 million visits, and 8475 data variables. Along with hospital operations data, newly generated data are entered into the platform in real time. Since its launch, the platform has supported more than 20 major projects and provided data service, storage, and computing power support to many scientific teams, facilitating a shift in the data support model—from conventional manual extraction to self-service retrieval (which has reached 8561 retrievals per month). Conclusions The platform can combine operation systems data from all departments and sections in a hospital to form a massive high-dimensional high-quality health care database that allows electronic medical records to be used effectively and taps into the value of data to fully support clinical services, scientific research, and operations management. The West China Hospital of Sichuan University big data platform can successfully generate multisource heterogeneous data storage and computing power. By effectively governing massive multidimensional data gathered from multiple sources, the West China Hospital of Sichuan University big data platform provides highly available data assets and thus has a high application value in the health care field. The West China Hospital of Sichuan University big data platform facilitates simpler and more efficient utilization of electronic medical record data for real-world research.
APA, Harvard, Vancouver, ISO, and other styles
40

Reddy, Vonteru Srikanth, and Kumar Debasis. "Statistical Review of Health Monitoring Models for Real-Time Hospital Scenarios." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 7s (July 13, 2023): 465–81. http://dx.doi.org/10.17762/ijritcc.v11i7s.7025.

Full text
Abstract:
Health Monitoring System Models (HMSMs) need speed, efficiency, and security to work. Cascading components ensure data collection, storage, communication, retrieval, and privacy in these models. Researchers propose many methods to design such models, varying in scalability, multidomain efficiency, flexibility, usage and deployment, computational complexity, cost of deployment, security level, feature usability, and other performance metrics. Thus, HMSM designers struggle to find the best models for their application-specific deployments. They must test and validate different models, which increases design time and cost, affecting deployment feasibility. This article discusses secure HMSMs' application-specific advantages, feature-specific limitations, context-specific nuances, and deployment-specific future research scopes to reduce model selection ambiguity. The models based on the Internet of Things (IoT), Machine Learning Models (MLMs), Blockchain Models, Hashing Methods, Encryption Methods, Distributed Computing Configurations, and Bioinspired Models have better Quality of Service (QoS) and security than their counterparts. Researchers can find application-specific models. This article compares the above models in deployment cost, attack mitigation performance, scalability, computational complexity, and monitoring applicability. This comparative analysis helps readers choose HMSMs for context-specific application deployments. This article also devises performance measuring metrics called Health Monitoring Model Metrics (HM3) to compare the performance of various models based on accuracy, precision, delay, scalability, computational complexity, energy consumption, and security.
APA, Harvard, Vancouver, ISO, and other styles
41

Rakhmawati, Rina, Elya Riska Dwi Wahyuni, Walda Khoiriyah, Titi Susanti, and Dwi Noviana Purnamasari. "Open Journal System (OJS) As An Office Automation Model." Diplomatika: Jurnal Kearsipan Terapan 5, no. 1 (January 11, 2023): 1. http://dx.doi.org/10.22146/diplomatika.68200.

Full text
Abstract:
The phenomenon of the COVID-19 pandemic forces the world community to transform into the world of work through the implementation of work from home. Many offices, especially in Indonesia, make use of various information systems and applications to facilitate work. Automation studies in the office environment are being studied again. The classic problem faced by most offices in Indonesia is that the automation system used is not integrated, one of which is the filing system. Most filing systems are limited to storing databases and tracking information. The archiving system model that is considered integrated, not limited to database storage and information retrieval, is the open journal system used by Indonesian national journals. This study aims to analyze the open journal system as a model for implementing the concept of office automation. The research object used is the open journal system used by accredited national journals in the social and humanities field. Data obtained through participatory observation of the open journal system used, in-depth interviews with journal managers, and literature studies. The data were processed and analyzed using the data triangulation approach. The results showed that the open journal system is an implementation of the concept of comprehensive office automation. However, it is necessary to conduct a study regarding the security and authentication of the metadata that is created on the system.
APA, Harvard, Vancouver, ISO, and other styles
42

Zhao, Meng, and Yong Ding. "Dual-Server Identity-Based Encryption with Authorized Equality Test for IoT Data in Clouds." Security and Communication Networks 2022 (October 11, 2022): 1–12. http://dx.doi.org/10.1155/2022/4905763.

Full text
Abstract:
The massive amounts of data collected by Internet of things (IoT) devices can be stored in clouds to solve the problem of the low storage capacity of IoT terminals. However, the privacy and security of outsourced IoT data may be compromised on the cloud side. Traditional cryptographic technologies can protect data privacy but require the user to retrieve the data for decryption and further processing, which would bring vast amounts of bandwidth and computation burden to users. This paper proposes a dual-server identity-based encryption scheme supporting authorized ciphertext equality test (DS-IBE-AET), where two noncolluding servers with authorizations from users can collaboratively carry out an equality test on outsourced IoT ciphertexts without decrypting the data. DS-IBE-AET can resist offline keyword guessing attacks confronted by existing encryption schemes with equality test in the single server model. Security analysis demonstrates that the proposed DS-IBE-AET scheme offers unforgeability for private keys of users and servers and confidentiality protection for outsourced IoT data and authentication tokens. The performance analysis indicates the practicality of our DS-IBE-AET construction for securing outsourced IoT data in clouds.
APA, Harvard, Vancouver, ISO, and other styles
43

Chen, Zhenwei, Axin Wu, Yifei Li, Qixuan Xing, and Shengling Geng. "Blockchain-Enabled Public Key Encryption with Multi-Keyword Search in Cloud Computing." Security and Communication Networks 2021 (January 20, 2021): 1–11. http://dx.doi.org/10.1155/2021/6619689.

Full text
Abstract:
The emergence of the cloud storage has brought great convenience to people’s life. Many individuals and enterprises have delivered a large amount of data to the third-party server for storage. Thus, the privacy protection of data retrieved by the user needs to be guaranteed. Searchable encryption technology for the cloud environment is adopted to ensure that the user information is secure with retrieving data. However, most schemes only support single-keyword search and do not support file updates, which limit the flexibility of the scheme. To eliminate these problems, we propose a blockchain-enabled public key encryption scheme with multi-keyword search (BPKEMS), and our scheme supports file updates. In addition, smart contract is used to ensure the fairness of transactions between data owner and user without introducing a third party. At the data storage stage, our scheme realizes the verifiability by numbering the files, which ensures that the ciphertext received by the user is complete. In terms of security and performance, our scheme is secure against inside keyword guessing attacks (KGAs) and has better computation overhead than other related schemes.
APA, Harvard, Vancouver, ISO, and other styles
44

Shinkar, Sonali V., and Dolly Thankachan. "SCMBQA: Design of a Customised SCM-Aware Sidechaining Model for QoS Enhancement under Attack Scenarios." International Journal on Recent and Innovation Trends in Computing and Communication 10, no. 1s (December 10, 2022): 200–212. http://dx.doi.org/10.17762/ijritcc.v10i1s.5824.

Full text
Abstract:
Storing& processing data for supply chain management (SCM) systems requires design of high-security and quality of service (QoS) aware models. These modelsassist in improving traceability performance of SCM deployments via integration of transparent & distributed mechanisms. A wide variety of security models are proposed by researchers to perform these tasks, and it is observed that blockchain-based SCM implementations outperform other models in terms of security & QoS metrics.But most of these implementationsare general-purpose and do not incorporate SCM-specific consensus & mining rules. It is also observed that, mining speed& throughput performance of these blockchain-based implementations reduces exponentially w.r.t. number of SCM transactions. To resolve these issues, this paper discusses design of a novel Proof-of-Supply Chain (PoSC) based consensus model, which is specifically designed for sidechain based SCM deployments. The PoSC consensus model is used for high-efficiency SCM-based data storage and communication scenarios. The proposed PoSC consensus model is capable of resisting selfish mining, time jacking, and sybil attacks, which are targeted towards SCM deployments. The model uses temporal performance metrics of miner nodes, and combines them with relationship graphs to form an SCM miner rank. Based on this rank, miner nodes are selected, and their consensus responses are recorded. These responses are processed using an augmented deep learning model, that is trained over 8 different SCM implementations via machine learning. After successful mining, responses obtained from these miners are used to incrementally train the machine learning model which assists in continuous performance improvement. The SCMBQA model was tested on milk supply chain, agriculture supply chain, and electronic supply chain applications, in terms of computational speed, throughput, energy requirement, retrieval & verification delay, and storage requirements. It was observed that the proposed PoSC consensus was capable of improving the computational speed by 8.5%, reduce energy consumption by 4.9%, improve throughput by 9.6%, and reduce storage costs by 15.4% when compared with standard blockchain-based SCM consensus models. This is because the proposed model deploys an intelligent sidechaining approach, that is capable of optimizing number of generated sidechains via temporal QoS & security performance metrics. Due to use of smaller chain lengths, the proposed model is capable of integrating privacy-aware & secure approaches depending upon different SCM stages. Thus, distributor-level security models are different than retailer-level security models, which assists in context-sensitive block deployments. Due to use of PoSC, the proposed model was observed to be 99.5% resilient against internal and external attacks, which makes it useful for real-time SCM deployments.
APA, Harvard, Vancouver, ISO, and other styles
45

Bommala, Harikrishna, Sireesha Vikkurty, K. Ramesh Babu, and Bhargavi Peddi Reddy. "Security Issues in Service Model of Fog Computing Environment." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 9s (August 31, 2023): 88–92. http://dx.doi.org/10.17762/ijritcc.v11i9s.7400.

Full text
Abstract:
Fog computing is an innovative way to expand the cloud platform by providing computing resources. The platform is a cloud that has the same data, management, storage and application features, but their origins are different because they are deployed to different locations. The platform system can retrieve a large amount, work in the field, be fully loaded, and mount on a variety of hardware devices. With this utility, Fog Framework is perfect for applications and critical moments. Fog computing is similar to cloud computing, but because of its variability, creates new security and privacy challenges that go beyond what is common for fog nodes. This paper aims to understand the impact of security problems and how to overcome them, and to provide future safety guidance for those responsible for building, upgrading and maintaining fog systems.
APA, Harvard, Vancouver, ISO, and other styles
46

Sumahasan, S., and D. Rajyalakshmi. "An Optimized Node Level Lightweight Security Algorithm for Cloud Assisted-IoT." International Journal on Recent and Innovation Trends in Computing and Communication 11, no. 9s (August 31, 2023): 78–87. http://dx.doi.org/10.17762/ijritcc.v11i9s.7399.

Full text
Abstract:
The fastest-evolving technology, the Internet of Things (IoT), will advance the fields of agriculture, defense, and medical electronics. IoT is focused on giving every object a purpose. IoT with cloud assistance offers a potential remedy for the issue of data expansion for individual objects with restricted capabilities. With the increasing use of cloud technology, the Internet of Things (IoT) has encountered additional security hurdles when it comes to exchanging data between two parties. To address this issue, a thorough investigation was conducted into a secure cloud-assisted strategy for managing IoT data, which ensures the safety of data during its collection, storage, and retrieval via the cloud, while also considering the growing number of users. To achieve this, a lightweight security mechanism that is optimized at the node level is implemented in the proposed system. By utilizing our technology, a secure IoT infrastructure can be established to prevent the majority of data confidentiality threats posed by both insiders and outsiders. Using a heartbeat sensor and a node MCU, we create a heartbeat monitoring system. At the node MCU level, giving security to the patient's health data and preventing unauthorized users from attacking it. Smaller key sizes and lightweight security techniques for IoT devices with minimal power, lower power and memory consumption and Execution time, transmission capacity reserve is used to achieve security. In order to achieve this. The performance of the RSA and ECC algorithms in terms of execution time, power consumption, and memory use have been tabulated for this experimental arrangement. The ECC method occurs to produce the best results in tiny devices.
APA, Harvard, Vancouver, ISO, and other styles
47

Anokhina, T. Y., and T. N. Zaitseva. "AUDIOVISUAL RECORDS AS A SOCIOCULTURAL PHENOMENON: PROBLEMS OF CREATION, STORAGE AND DEVELOPMENT PROSPECTS." KAZAN SOCIALLY-HUMANITARIAN BULLETIN 11, no. 2 (February 2020): 4–8. http://dx.doi.org/10.24153/2079-5912-2020-11-2-4-8.

Full text
Abstract:
The article analyzes the actual problem - the state and prospects of development of audiovisual documentation systems in the context of social needs. It is well known from the scientific literature that different states can group the same audiovisual material in different ways, using different characteristics. Firstly, this is due to constant changes in the technical equipment necessary for the storage and reproduction of audiovisual documents. Constant improvement of selection and storage technologies of audiovisual documents dictates the modernization of technologies for ensuring the preservation and func- tionality of the information retrieval systems. The relevance of the problem is given by the fact that audiovisual documentation currently occupies a leading position in various fields of culture, science, politics, sport and so on. A study of foreign and relatively small Russian experience shows that digital technologies are rapidly developing at the pre- sent time, which gives the article not only theoretical, but also practical significance. The technology of digitizing archival documentation and its storage on optical media is considered today as one of the most advanced and perspective in terms of security and access to archival documentation, which gives a promising focus to scientific developments in this area. The novelty of the approach in the article can be demonstrated by the following conclusion: the use of an archive of audi- ovisual documents opens up completely new perspectives in the field of publishing activities of scientists, for example, it al- lows to combine previously incompatible types of documents - texts, graphics, photographs and video documents. Conclusions and theoretical provisions of the article can be used in the professional activities of the archives of the Russian Federation. In addition, they can be useful for all people who are interested in the variety of historical facts documented on multimedia media, not only in Russia but also abroad.
APA, Harvard, Vancouver, ISO, and other styles
48

Fu, Siyi, and Kaza Mojtahe. "Harr-NMF Feature Extraction for Multilevel Educational Technology Teaching Big Data System." Security and Communication Networks 2022 (May 18, 2022): 1–12. http://dx.doi.org/10.1155/2022/3178763.

Full text
Abstract:
An essential role in improving educational informatization and encouraging new approaches to education is played by educational technology, a specialist field that supports both theorising and doing in this area. When it comes to learning educational technology, students must have excellent professional knowledge and abilities, as well as a thorough understanding of data. Harr-NMF feature extraction for educational technology teaching large data systems is the focus of this project. With the help of big data technology, the construction of a teaching resource sharing system provides useful solutions for the storage and sharing of current and future massive teaching resources, enables fast and accurate analysis and retrieval of massive teaching resources and data, improves the security and scalability of the system while maintaining system stability, and promotes education teaching informatization to a new level. The system can be used to analyze and retrieve data quickly and accurately. By mapping different types of Harr-NMF features into a gradient matrix using grayscale projection, pattern classification is performed through the simplified gradient matrix as features. The algorithm complexity of feature extraction is eventually reduced to a great extent by the fast advantage of feature extraction by this algorithm. The Harr-NMF algorithm and the similarity relation matrix are used to obtain the optimal parameter values and the corresponding affiliation matrix and class centers, thus providing effective initial values for Harr-NMF, which effectively solves the problems of slow convergence and easy to fall into local minima of the Harr-NMF algorithm. The algorithm of this paper is compared with several improved algorithms of Harr-NMF in terms of convergence, recognition rate, and other performance to verify the feasibility and effectiveness of this paper. With a combination of qualitative and quantitative approaches, the data literacy of teaching educational technology is dissected and constructed to enhance its data literacy and improve the quality of education technology discipline personnel training.
APA, Harvard, Vancouver, ISO, and other styles
49

Zhang, Ping, Jinbo Li, and Zhumu Fu. "Public Key Encryption with Equality Test in a Cloud Environment." Information 13, no. 6 (May 24, 2022): 265. http://dx.doi.org/10.3390/info13060265.

Full text
Abstract:
With the rapid development and wide application of cloud computing and 5G communication, the number of mobile users is increasing rapidly, meaning that cloud storage services are receiving more and more attention. The equality test technology of retrievable encrypted data has become a hot research topic among scholars in recent years. In view of the problem of offline keyword-guessing attacks (KGAs) caused by collusion between internal servers and users, a public key encryption with equality test scheme (RKGA-CET) with higher security against KGAs is proposed. Based on the assumed difficulty of the discrete logarithm problem (DLP) and the properties of bilinear mapping, a specific encryption algorithm that encrypts the keyword twice is designed. In the first encryption stage, we convert the keyword according to the property of isomorphism of a finite field. In the second encryption stage, we encrypt the converted keyword vector and embed the user’s private key, and then perform the equality test. The algorithm ensures that the adversary cannot generate legal ciphertexts and implement KGAs when the secondary server is offline. At the same time, the algorithm also supports two authorization modes, in which case users can flexibly choose the corresponding authorization mode according to their own needs. Performance analysis shows that this scheme has overall superiority compared with other similar ones.
APA, Harvard, Vancouver, ISO, and other styles
50

Tseng, Yi-Fan, Zi-Yuan Liu, Jen-Chieh Hsu, and Raylin Tso. "Private Predicate Encryption for Inner Product from Key-Homomorphic Pseudorandom Function." Security and Communication Networks 2021 (February 12, 2021): 1–12. http://dx.doi.org/10.1155/2021/6678194.

Full text
Abstract:
Predicate encryption (PE), formalized by Katz et al., is a new paradigm of public-key encryption that conceptually captures the public-key encryption that supports fine-grained access control policy. Because of the nature of PE, it is used for cloud storage so that users can retrieve encrypted data without revealing any information about the data to cloud servers and other users. Although lots of PE schemes have been studied, the predicate-hiding security is seldom considered; that is, the user’s secret key may leak sensitive information of the predicate. Additionally, the security of the current predicate-hiding PE schemes relies on the discrete logarithm assumption which cannot resist the quantum attacks in the future. In this paper, we propose a generic PE for inner product under symmetric-key setting, called private IPE, from specific key-homomorphic pseudorandom function (PRF). The rigorous proofs are provided to show that the construction is payload-hiding, attribute-hiding, and predicate-hiding secure. With the advantage of the generic construction, if the underlying PRF can resist quantum attacks, then, through our proposed generic construction, a quantum-resistant private IPE can be obtained.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography