Статті в журналах з теми "Security of private data"

Щоб переглянути інші типи публікацій з цієї теми, перейдіть за посиланням: Security of private data.

Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями

Оберіть тип джерела:

Ознайомтеся з топ-50 статей у журналах для дослідження на тему "Security of private data".

Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.

Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.

Переглядайте статті в журналах для різних дисциплін та оформлюйте правильно вашу бібліографію.

1

Kapil, Gayatri, Alka Agrawal, and R. A. Khan. "Big Data Security and Privacy Issues." Asian Journal of Computer Science and Technology 7, no. 2 (August 5, 2018): 128–32. http://dx.doi.org/10.51983/ajcst-2018.7.2.1861.

Повний текст джерела
Анотація:
Big data gradually become a hot topic of research and business and has been growing at exponential rate. It is a combination of structured, semi-structured & unstructured data which is generated constantly through various sources from different platforms like web servers, mobile devices, social network, private and public cloud etc. Big data is used in many organisations and enterprises, big data security and privacy have been increasingly concerned. However, there is a clear contradiction between the large data security and privacy and the widespread use of big data. In this paper, we have indicated challenges of security and privacy in big data. Then, we have presented some possible methods and techniques to ensure big data security and privacy.
Стилі APA, Harvard, Vancouver, ISO та ін.
2

Alqadi, Ziad, and Mohammad S. Khrisat. "DATA STEGANOGRAPHY USING EMBEDDED PRIVATE KEY." International Journal of Engineering Technologies and Management Research 7, no. 9 (September 21, 2020): 31–38. http://dx.doi.org/10.29121/ijetmr.v7.i9.2020.782.

Повний текст джерела
Анотація:
LSB2 method of data steganography is one of the most popular methods used to hide secret messages in digital color image. This method keeps the quality of the holding image high but it is not secure and it can be easily hacked. In this paper a method of improving the security of LSB2 method will be proposed, tested and implemented. The added security issues are simple and do require extra memory and time for execution. An embedded key will be extracted from the holding image to encrypt the message, this key will be variable and depends on the selected covering image, selected message length and selected position in the image where to extract the embedded key; the selected position and message length will form a private key to enhance LSB2 security.
Стилі APA, Harvard, Vancouver, ISO та ін.
3

Hussain, Md Equebal, and Mohammad Rashid Hussain. "Securing Cloud Data using RSA Algorithm." International Journal of Recent Contributions from Engineering, Science & IT (iJES) 6, no. 4 (December 19, 2018): 96. http://dx.doi.org/10.3991/ijes.v6i4.9910.

Повний текст джерела
Анотація:
security is one of the most important concern on cloud computing therefore institutions are hesitating to host their data over cloud. Not all data can be afforded to move on the cloud (example accounts data). The main purpose of moving data over cloud is to reduce cost (infrastructure and maintenance), faster performance, easy upgrade, storage capacity but at the same time security is major concern because cloud is not private but maintained by third party over the internet, security issues like privacy, confidentiality, authorization (what you are allowed to do), authentication (who you are) and accounting (what you actually do) will be encountered. Variety of encryption algorithms required for higher level of security. In this paper we try to provide solution for better security by proposing a combined method of key exchange algorithm with encryption technique. Data stored in cloud can be protected from hackers using proposed solution because even if transmitted key is hacked of no use without user’s private key.
Стилі APA, Harvard, Vancouver, ISO та ін.
4

Srinivasu, N., Masood Sahil, Jeevan Francis, and Sure Pravallika. "Security enhanced using honey encryption for private data sharing in cloud." International Journal of Engineering & Technology 7, no. 1.1 (December 21, 2017): 675. http://dx.doi.org/10.14419/ijet.v7i1.1.10826.

Повний текст джерела
Анотація:
In today’s modern age technology as there is a production of vast amount of data, it is getting very difficult to store such a vast amount of information. The best way to store this huge data is on cloud. As nowadays business organisations are moving towards cloud to store their data, security remains the primary concern. Is the data securing enough on the cloud or not? One of the ways to secure data on cloud is by providing security on cloud through Honey Encryption. Juels&Ristenrpart introduced honey encryption and showed how to achieve message recovery security even in the face of attacks that can exhaustively try all likely keys. Honey Encryption is a new encryption scheme that ensures the messages decrypted with invalid keys yield a valid looking message. In this paper, we present our implementation of Honey Encryption and apply it to useful real-world scenarios such as providing security to files which are been saved in cloud. The files contain variety of information in it. We also provide assurance against brute force attacks.
Стилі APA, Harvard, Vancouver, ISO та ін.
5

Gatkal, Suyog, Vinayak Dhage, Dhanashree Kalekar, and Sanket Ghadge. "Survey on Medical Data Storage Systems." International Journal of Soft Computing and Engineering 11, no. 1 (September 30, 2021): 44–48. http://dx.doi.org/10.35940/ijsce.a3528.0911121.

Повний текст джерела
Анотація:
Nowadays digital data storage and digital communication are widely used in the healthcare sector. Since data in the digital form significantly easier to store, retrieve, manipulate, analyses, and manage. Also, digital data eliminate the threat of data loss considerably. These advantages pushing many hospitals to store their data digitally. But, as the patients reveal their private and important information to the doctor, it is very crucial to maintain the privacy, security, and reliability of the healthcare data. In this process of handling the data securely, several technologies are being used like cloud storage, data warehousing, blockchain, etc. The main aim of this survey is to study the different models and technologies in the healthcare sector and analyses them on different parameters like security, privacy, performance, etc. This study will help the new developing healthcare systems to choose appropriate technology and approach to build a more efficient, robust, secure, and reliable system.
Стилі APA, Harvard, Vancouver, ISO та ін.
6

Deb, Nabamita, Mohamed A. Elashiri, T. Veeramakali, Abdul Wahab Rahmani, and Sheshang Degadwala. "A Metaheuristic Approach for Encrypting Blockchain Data Attributes Using Ciphertext Policy Technique." Mathematical Problems in Engineering 2022 (February 10, 2022): 1–10. http://dx.doi.org/10.1155/2022/7579961.

Повний текст джерела
Анотація:
Unlike public chains, the Alliance Blockchain Hyperledger Fabric has a member management service mechanism that may provide data isolation security at the channel level. However, because this data isolation security technique synchronizes plaintext data inside the channel, data leakage is still a possibility. Furthermore, in some fine-grained privacy protection circumstances, channel-based data access restriction is ineffective. In order to solve the data privacy security problems in the above-mentioned consortium chain superledger, a blockchain data attribute encryption scheme based on ciphertext policy is proposed. Combining the original Fabric Certificate Authority module in the Hyperledger, the proposed scheme can realize the user-level fine-grained security access to control blockchain data while also realizing the secure distribution of user attribute keys in the blockchain data attribute encryption scheme based on the ciphertext policy scheme. The security analysis of the scheme shows that the scheme achieves the security goals of attribute-based encryption user attribute private key secure distribution and data privacy protection. The scope of this research is that this study confirms that the solution’s architecture achieves fine-grained access control of private data on the Hyperledger Blockchain network and also the security objectives of secure transmission of user characteristic secret keys and data privacy protection. The performance analysis part also shows that the proposed scheme has good usability.
Стилі APA, Harvard, Vancouver, ISO та ін.
7

Avant, Deborah, and Kara Kingma Neu. "The Private Security Events Database." Journal of Conflict Resolution 63, no. 8 (January 30, 2019): 1986–2006. http://dx.doi.org/10.1177/0022002718824394.

Повний текст джерела
Анотація:
Since the 1990s, the private provision of military and security services has become a common feature of local, national, and transnational politics. The prevalence of private security has generated important questions about its consequences, but data to answer these questions are sparse. In this article, we introduce the Private Security Events Database (PSED) that traces the involvement of private military and security companies (PMSCs) in events in Africa, Latin America, and Southeast Asia from 1990 to 2012. We describe the PSED project, highlight its descriptive findings, conduct a replication and reanalysis of Akcinaroglu and Radziszewski’s contract data in Africa, and compare the two databases’ coverage of Sierra Leone from 1991 to 1997. Our analysis demonstrates new insights into the relationship between PMSCs and civil war duration, confirming a correlation between PMSC presence and shorter conflicts, but questioning the logic Akcinaroglu and Radziszewski propose. It also points to a number of productive paths for future research.
Стилі APA, Harvard, Vancouver, ISO та ін.
8

Coutu, Sylvain, Inbal Becker-Reshef, Alyssa K. Whitcraft, and Chris Justice. "Food security: underpin with public and private data sharing." Nature 578, no. 7796 (February 2020): 515. http://dx.doi.org/10.1038/d41586-020-00241-y.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
9

Hennessy, S. D., G. D. Lauer, N. Zunic, B. Gerber, and A. C. Nelson. "Data-centric security: Integrating data privacy and data security." IBM Journal of Research and Development 53, no. 2 (March 2009): 2:1–2:12. http://dx.doi.org/10.1147/jrd.2009.5429044.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
10

Park, Young-Hoon, Yejin Kim, and Junho Shim. "Blockchain-Based Privacy-Preserving System for Genomic Data Management Using Local Differential Privacy." Electronics 10, no. 23 (December 3, 2021): 3019. http://dx.doi.org/10.3390/electronics10233019.

Повний текст джерела
Анотація:
The advances made in genome technology have resulted in significant amounts of genomic data being generated at an increasing speed. As genomic data contain various privacy-sensitive information, security schemes that protect confidentiality and control access are essential. Many security techniques have been proposed to safeguard healthcare data. However, these techniques are inadequate for genomic data management because of their large size. Additionally, privacy problems due to the sharing of gene data are yet to be addressed. In this study, we propose a secure genomic data management system using blockchain and local differential privacy (LDP). The proposed system employs two types of storage: private storage for internal staff and semi-private storage for external users. In private storage, because encrypted gene data are stored, only internal employees can access the data. Meanwhile, in semi-private storage, gene data are irreversibly modified by LDP. Through LDP, different noises are added to each section of the genomic data. Therefore, even though the third party uses or exposes the shared data, the owner’s privacy is guaranteed. Furthermore, the access control for each storage is ensured by the blockchain, and the gene owner can trace the usage and sharing status using a decentralized application in a mobile device.
Стилі APA, Harvard, Vancouver, ISO та ін.
11

Agarwal, Archita, Maurice Herlihy, Seny Kamara, and Tarik Moataz. "Encrypted Databases for Differential Privacy." Proceedings on Privacy Enhancing Technologies 2019, no. 3 (July 1, 2019): 170–90. http://dx.doi.org/10.2478/popets-2019-0042.

Повний текст джерела
Анотація:
Abstract The problem of privatizing statistical databases is a well-studied topic that has culminated with the notion of differential privacy. The complementary problem of securing these differentially private databases, however, has—as far as we know—not been considered in the past. While the security of private databases is in theory orthogonal to the problem of private statistical analysis (e.g., in the central model of differential privacy the curator is trusted) the recent real-world deployments of differentially-private systems suggest that it will become a problem of increasing importance. In this work, we consider the problem of designing encrypted databases (EDB) that support differentially-private statistical queries. More precisely, these EDBs should support a set of encrypted operations with which a curator can securely query and manage its data, and a set of private operations with which an analyst can privately analyze the data. Using such an EDB, a curator can securely outsource its database to an untrusted server (e.g., on-premise or in the cloud) while still allowing an analyst to privately query it. We show how to design an EDB that supports private histogram queries. As a building block, we introduce a differentially-private encrypted counter based on the binary mechanism of Chan et al. (ICALP, 2010). We then carefully combine multiple instances of this counter with a standard encrypted database scheme to support differentially-private histogram queries.
Стилі APA, Harvard, Vancouver, ISO та ін.
12

Sood, Sandeep K. "Hybrid Data Security Model for Cloud." International Journal of Cloud Applications and Computing 3, no. 3 (July 2013): 50–59. http://dx.doi.org/10.4018/ijcac.2013070104.

Повний текст джерела
Анотація:
Security of data is one of the main concern in the implementation of cloud computing. This paper proposes a highly effective and efficient cloud security model. The proposed security model keeps the most critical data on the private cloud and the rest of it on the public cloud. It uses hash codes to check the integrity of the data at the public cloud. The proposed cloud security model provides the provision of defining user roles thereby determining the type of access the user exercises on the data. This model uses dual verification mechanism for user authentication by using username and password on one layer and key authentication on another layer. A cryptographic process is used to make the overall security of the data on the cloud highly robust. A comprehensive security analysis of the model is done against various types of attacks and the results are very promising. This model is compared to various existing cloud security models and the results shows that our technique is faster, much more robust and efficient as compared to other existing models. This model is cost effective because it uses private cloud only for highly sensitive data. Rest of data is stored on the public cloud, where data storage cost is comparatively very less.
Стилі APA, Harvard, Vancouver, ISO та ін.
13

Carrillo, Eduardo, and Maricarmen Sequera. "PERSONAL DATA IN THE SOCIAL SECURITY INSTITUTE." Law, State and Telecommunications Review 12, no. 2 (October 13, 2020): 14–37. http://dx.doi.org/10.26512/lstr.v12i2.34689.

Повний текст джерела
Анотація:
Purpose ”“ The research aims to observe and describe the legal framework and implementation practices of personal databases management in the Social Security Institute (IPS), the most important public social insurance system in Paraguay. Methodology ”“ The research is exploratory, consisting on both substantive and procedural law analysis of health information storage regulations and its compliance. Also, interview to private companies, the public sector and one qualified worker insured by IPS are conducted to better understand collection, storage and maintenance of health records databases. Findings ”“ Research indicates evidence that biometric data storage of insurers does not have adequate regulation for its protection. It also shows evidence that private companies don’t deliver by default medical records to workers, as well as potential access to these records by administrative personal. Evidence also signals that clinics performing medical examinations request more sensitive information than required by law. Research limitations It is identified that a broader private company sample could be of use to better understand workers health record collection. Also, third party auditing IPS IT systems could be of use to further understand information management practices and vulnerabilities. Practical Implications ”“ A series of discretional practices are identified, signaling regulatory standardization urgency for all actors. A comprehensive Protection of Personal Data Act is needed. Originality ”“ No comprehensive research targeting the IPS system and its health personal data management processes is identified. The research is considered an initial contribution to the state of the art on the subject and specially to biometric collection and storage.
Стилі APA, Harvard, Vancouver, ISO та ін.
14

Tian, Jun-Feng, and Hao-Ning Wang. "An efficient and secure data auditing scheme based on fog-to-cloud computing for Internet of things scenarios." International Journal of Distributed Sensor Networks 16, no. 5 (May 2020): 155014772091662. http://dx.doi.org/10.1177/1550147720916623.

Повний текст джерела
Анотація:
With the widespread use of fog-to-cloud computing–based Internet of things devices, how to ensure the integrity of the data uploaded to the cloud has become one of the most important security issues. This article proposes an efficient and secure data auditing scheme based on fog-to-cloud computing for Internet of things scenarios, which can better meet performance and security requirements. The proposed scheme realizes data sharing under the condition of protecting privacy by encrypting sensitive information. Using the private key separation method, the private key is divided into two parts using identity information generation and random selection which are, respectively, held by the user and the fog center. Then, using the two-time signature method, the Internet of things and fog computing center use two parts of the private key to generate the original signature and final signature in two separate times. Since the fog computing center only has a part of the private key generated using the identity information, the security of the system will not be damaged due to the leakage of part of the private key held by the fog center, and the fog center significantly participates in the signature generation process, which significantly reduces the computation and communication overhead of the Internet of things device. Security analysis and performance evaluation show that the proposed scheme is safe and efficient.
Стилі APA, Harvard, Vancouver, ISO та ін.
15

Beardsley, Bob. "Private Security: Enigma and Overlooked Resource." Journal of Contemporary Criminal Justice 3, no. 4 (December 1987): 44–51. http://dx.doi.org/10.1177/104398628700300404.

Повний текст джерела
Анотація:
This article fist appeared in the June 1985 issue of The Silver Star, official publication of the San Diego County Deputy Sheriffs' Association. It has been rewritten and updated to include legislative changes, recent case law, and revised statistical data.
Стилі APA, Harvard, Vancouver, ISO та ін.
16

Yovine, Sergio, Franz Mayr, Sebastián Sosa, and Ramiro Visca. "An Assessment of the Application of Private Aggregation of Ensemble Models to Sensible Data." Machine Learning and Knowledge Extraction 3, no. 4 (September 25, 2021): 788–801. http://dx.doi.org/10.3390/make3040039.

Повний текст джерела
Анотація:
This paper explores the use of Private Aggregation of Teacher Ensembles (PATE) in a setting where students have their own private data that cannot be revealed as is to the ensemble. We propose a privacy model that introduces a local differentially private mechanism to protect student data. We implemented and analyzed it in case studies from security and health domains, and the result of the experiment was twofold. First, this model does not significantly affecs predictive capabilities, and second, it unveiled interesting issues with the so-called data dependency privacy loss metric, namely, high variance and values.
Стилі APA, Harvard, Vancouver, ISO та ін.
17

C P, SHANTALA, and K. V. Viswanatha. "Secure SDN Framework for Data Exfiltration via Video Steganography." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 14, no. 9 (June 22, 2015): 6067–73. http://dx.doi.org/10.24297/ijct.v14i9.1847.

Повний текст джерела
Анотація:
The popularity of steganography in the data exfiltration of private corporate sensitive data is increased. So it is important to detect such malicious activity. Becausethe data being transferred can hide the large amount of data in video becoming increasingly attractive. To ensure privacy and security we proposed an effective steganalysis method to detect hidden data in video by using the SDN framework policy. The main objective of this paper is to prevent the illegal data transmission from the compromised private network by the malicious users.
Стилі APA, Harvard, Vancouver, ISO та ін.
18

Guo, Hong Liang, and He Long Yu. "Position Mobil Information Encryption Algorithm Based on Key Attributes of Reduced Rank Agent under Cloud Storage." Advanced Materials Research 989-994 (July 2014): 2008–11. http://dx.doi.org/10.4028/www.scientific.net/amr.989-994.2008.

Повний текст джерела
Анотація:
The location mobile social networks information privacy protection under the environment of cloud storage and data security of encryption is researched, the traditional data encryption to rank has higher in the length of ciphertext and private key attributes of large matrix, it defines the length of ciphertext data on customer privacy private property and it cannot be revoked. The encryption complexity and security are not good. An improved encryption algorithm based on key attributes of reduced rank agent is proposed, the proxy ReEncryption technology is taken, the ReEncrypt decryption scheme is designed, and private key attributes of bilinear mapping and reduced rank processing is taken, and a communication channel between the user, CSP, trusted third party and data users is established, and the algorithm is obtained. The simulation is taken for testing the customer information data for privacy protection, the simulation results show that it can ensure the length of ciphertext is relatively small, and it has low computational complexity with more security, and it has the very good practical value in encryption communication and privacy protection fields.
Стилі APA, Harvard, Vancouver, ISO та ін.
19

Satya Sai Kumar, Avula, S. Mohan, and R. Arunkumar. "A Survey on Security Models for Data Privacy in Big Data Analytics." Asian Journal of Computer Science and Technology 7, S1 (November 5, 2018): 87–89. http://dx.doi.org/10.51983/ajcst-2018.7.s1.1798.

Повний текст джерела
Анотація:
As emerging data world like Google and Wikipedia, volume of the data growing gradually for centralization and provide high availability. The storing and retrieval in large volume of data is specialized with the big data techniques. In addition to the data management, big data techniques should need more concentration on the security aspects and data privacy when the data deals with authorized and confidential. It is to provide secure encryption and access control in centralized data through Attribute Based Encryption (ABE) Algorithm. A set of most descriptive attributes is used as categorize to produce secret private key and performs access control. Several works proposed in existing based on the different access structures of ABE algorithms. Thus the algorithms and the proposed applications are literally surveyed and detailed explained and also discuss the functionalities and performance aspects comparison for desired ABE systems.
Стилі APA, Harvard, Vancouver, ISO та ін.
20

Abd, Mohammad Hasan. "Dynamic Data Replication for Higher Availability and Security." Wasit Journal of Computer and Mathematics Science 1, no. 1 (March 17, 2021): 31–42. http://dx.doi.org/10.31185/wjcm.vol1.iss1.6.

Повний текст джерела
Анотація:
The paradigm and domain of data security is the key point as per the current era in which the data is getting transmitted to multiple channels from multiple sources. The data leakage and security loopholes are enormous and there is need to enforce the higher levels of security, privacy and integrity. Such sections incorporate e-administration, long range interpersonal communication, internet business, transportation, coordinations, proficient correspondences and numerous others. The work on security and trustworthiness is very conspicuous in the systems based situations and the private based condition. This examination original copy is exhibiting the efficacious use of security based methodology towards the execution with blockchain programming utilizing robustness and different devices. The blockchain based mix is currently days utilized for e-administrations and military applications for the noticeable security based applications. To work with the high performance approaches and algorithms, the blockchain technology is quite prominent and used in huge performance aware patterns whereby the need to enforce the security is there. The work integrates the usage patterns of blockchain technologies so that the overall security and integrity can be improved in which there is immutability and strength based algorithms for enforce the security measures.
Стилі APA, Harvard, Vancouver, ISO та ін.
21

Karaçay, Leyli, Erkay Savaş, and Halit Alptekin. "Intrusion Detection Over Encrypted Network Data." Computer Journal 63, no. 4 (November 17, 2019): 604–19. http://dx.doi.org/10.1093/comjnl/bxz111.

Повний текст джерела
Анотація:
Abstract Effective protection against cyber-attacks requires constant monitoring and analysis of system data in an IT infrastructure, such as log files and network packets, which may contain private and sensitive information. Security operation centers (SOC), which are established to detect, analyze and respond to cyber-security incidents, often utilize detection models either for known types of attacks or for anomaly and applies them to the system data for detection. SOC are also motivated to keep their models private to capitalize on the models that are their propriety expertise, and to protect their detection strategies against adversarial machine learning. In this paper, we develop a protocol for privately evaluating detection models on the system data, in which privacy of both the system data and detection models is protected and information leakage is either prevented altogether or quantifiably decreased. Our main approach is to provide an end-to-end encryption for the system data and detection models utilizing lattice-based cryptography that allows homomorphic operations over ciphertext. We employ recent data sets in our experiments which demonstrate that the proposed privacy-preserving intrusion detection system is feasible in terms of execution times and bandwidth requirements and reliable in terms of accuracy.
Стилі APA, Harvard, Vancouver, ISO та ін.
22

Shen, Qingni, Yahui Yang, Zhonghai Wu, Dandan Wang, and Min Long. "Securing data services: a security architecture design for private storage cloud based on HDFS." International Journal of Grid and Utility Computing 4, no. 4 (2013): 242. http://dx.doi.org/10.1504/ijguc.2013.057118.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
23

Kasthuri, Magesh. "Blockchain based Data Security as a Service in Cloud Platform Security." International Journal on Cloud Computing: Services and Architecture 11, no. 6 (December 31, 2021): 1–8. http://dx.doi.org/10.5121/ijccsa.2021.11601.

Повний текст джерела
Анотація:
Blockchain is widely used for money related transaction and still there are many proven usecases across different industries like Retail in stock checks and order management, Manufacturing in good movement processing, Health care in patient database management to name a few. With this in mind, it is always important to understand the merits and demerits of both Public and Private Blockchain to understand their capabilities and limitations to decide which one is more suitable for an industry specific usecase implementation. In a Cloud based platform, data security plays a crucial role to cater to data protection and regulatory requirements and Blockchain can play an important role in this for accelerated workflow by providing ‘data security’ as a service capability.
Стилі APA, Harvard, Vancouver, ISO та ін.
24

Sun, Jianglin, Xiaofeng Liao, Xin Chen, and Shangwei Guo. "Privacy-Aware Image Encryption Based on Logistic Map and Data Hiding." International Journal of Bifurcation and Chaos 27, no. 05 (May 2017): 1750073. http://dx.doi.org/10.1142/s0218127417500730.

Повний текст джерела
Анотація:
The increasing need for image communication and storage has created a great necessity for securely transforming and storing images over a network. Whereas traditional image encryption algorithms usually consider the security of the whole plain image, region of interest (ROI) encryption schemes, which are of great importance in practical applications, protect the privacy regions of plain images. Existing ROI encryption schemes usually adopt approximate techniques to detect the privacy region and measure the quality of encrypted images; however, their performance is usually inconsistent with a human visual system (HVS) and is sensitive to statistical attacks. In this paper, we propose a novel privacy-aware ROI image encryption (PRIE) scheme based on logistical mapping and data hiding. The proposed scheme utilizes salient object detection to automatically, adaptively and accurately detect the privacy region of a given plain image. After private pixels have been encrypted using chaotic cryptography, the significant bits are embedded into the nonprivacy region of the plain image using data hiding. Extensive experiments are conducted to illustrate the consistency between our automatic ROI detection and HVS. Our experimental results also demonstrate that the proposed scheme exhibits satisfactory security performance.
Стилі APA, Harvard, Vancouver, ISO та ін.
25

Kasza, Péter, Péter Ligeti, and Ádám Nagy. "Siren: Secure data sharing over P2P and F2F networks." Studia Scientiarum Mathematicarum Hungarica 52, no. 2 (June 2015): 257–64. http://dx.doi.org/10.1556/012.2015.52.2.1316.

Повний текст джерела
Анотація:
In this paper we propose a decentralized privacy-preserving system which is able to share sensible data in a way, that only predefined subsets of authorized entities can recover the data after getting an additional alarm message. The protocol uses two main communication channels: a P2P network where the encrypted information is stored, and a smaller private P2P network, which consists of the authorized parties called friend-to-friend network. We describe the communication protocol fulfilling the desired security requirements. The proposed protocol achieves unconditional security. The main cryptographic building blocks of the protocol are symmetric encryption schemes and secret sharing schemes.
Стилі APA, Harvard, Vancouver, ISO та ін.
26

Jawdhari, Hayder A., and Alharith A. Abdullah. "A New Environment of Blockchain based Multi Encryption Data Transferring." Webology 18, no. 2 (December 30, 2021): 1379–91. http://dx.doi.org/10.14704/web/v18i2/web18396.

Повний текст джерела
Анотація:
Blockchain is one of the technologies provided by the global distribution of computing power. Simply put, the blockchain is the digital ledger in which transactions are recorded. It all started with a desire to see a new form of security system for transferring confidential files. It aims to achieve many goals like decreasing the process time for transferring files to the other party, and reducing the overall expenses as the files are only transferred across the blockchain network with no need for the files to be uploaded and downloaded to the drive. More effective applications have the ability to share files via the technology of Blockchain. The great challenge is to build a private blockchain environment to send files and distribute them securely between parties, such as military institutions and others. In this paper, a private blockchain is built to overcome the side of the security through a secured file-sharing network. This private Blockchain can be utilized at various institutions. A high scale of security is obtained through using an important algorithm that takes into consideration a critical part of the field of cryptography to robustly encrypt the files. The latter ensures that no individual except for the receiver has the ability to access the files. As well, a sufficient speed was obtained when transferring the files, as compared to Ethereum with FTP. Finally, smart contracts have been designed to suit the transfer of files between nodes.
Стилі APA, Harvard, Vancouver, ISO та ін.
27

R. Sneberger, Michael. "Reconciling Competing Data Security Standards Applicable to Data Held by Retail Banks Operating in California in Light of Van Buren and TransUnion." Global Privacy Law Review 2, Issue 3 (October 1, 2021): 174–85. http://dx.doi.org/10.54648/gplr2021023.

Повний текст джерела
Анотація:
When operating in California, retail banks face competing, seemingly inconsistent, federal, state, and industry data security standards. The article describes what regulations prescribe data security standards for banks operating in California. It analyses private rights of action available in the event of a data breach, how such private rights may be affected by the Van Buren and TransUnion decisions, and what data security standards are set forth by each of the controlling regulatory regimes, as well as other industry standards which may inform the applicable standard of care regarding non-personal information. Finally, the article presents a position on how a California bank can reconcile the applicable security standards, and provides a suggestion for a data security benchmark for retail banks operating in California by positing that a ‘reasonable’ data security program is not only one based on assessment of risk and industry best practices, but is also reconcilable with the seemingly competing regulatory regimes applicable to banks operating in California.
Стилі APA, Harvard, Vancouver, ISO та ін.
28

Rath, Annanda, Bojan Spasic, Nick Boucart, and Philippe Thiran. "Security Pattern for Cloud SaaS: From System and Data Security to Privacy Case Study in AWS and Azure." Computers 8, no. 2 (May 3, 2019): 34. http://dx.doi.org/10.3390/computers8020034.

Повний текст джерела
Анотація:
The Cloud is fast becoming a popular platform for SaaS, a popular software delivery model. This is because the Cloud has many advantages over the traditional private infrastructure, such as increased flexibility, no maintenance, less management burden, easy access and easy to share information. However, there are many concerns around issues like system security, communication security, data security, privacy, latency and availability. In addition, when designing and developing Cloud SaaS application, these security issues need to be addressed in order to ensure regulatory compliance, security and trusted environment for Cloud SaaS users. In this paper, we explore the security patterns for Cloud SaaS. We work on the patterns covering different security aspects from system and data security to privacy. Our goal is to produce the security best practices and security knowledge documentation that SaaS developer can use as a guideline for developing Cloud SaaS applications from the ground up. In addition to that, we also provide a case study of security patterns and solutions in AWS and Azure.
Стилі APA, Harvard, Vancouver, ISO та ін.
29

Yakhtin, Vasily. "National Information Risks of Big Data." Vestnik Volgogradskogo gosudarstvennogo universiteta. Ekonomika, no. 3 (November 2021): 16–25. http://dx.doi.org/10.15688/ek.jvolsu.2021.3.2.

Повний текст джерела
Анотація:
The importance of this research is determined by the impact of Industry 4.0 technologies on national economic security. The Russian government aims to use modern information technologies as a leading tool of global competitiveness. The scale of public spending on the information & communication and end-to-end technologies development and implementation in the Russian Federation exceeds the majority of socially significant national projects. Industry 4.0 technologies not only provide successful development of the state, but also carry potential threats and risks. The article analyzes the big data technologies impact on the information systems security of private organizations and government agencies. The article considers interpretations of the “big data” category formulated by foreign and domestic researchers. The study reveals a trend describing an increasing number of incidents related to the leakage of personal data and other valuable information. The author modeled the possible damage caused by leaks of personal data and other valuable information incurred by private organizations and government agencies of the Russian Federation for the period from 2016 to 2019. The article identifies the need for improving Russian legislation in the field of big data collection and use. Moreover, the author identifies the necessity for encouraging the introduction of modern information security tools in private organizations and government agencies.
Стилі APA, Harvard, Vancouver, ISO та ін.
30

Corones, Stephen, and Juliet Davis. "Protecting Consumer Privacy and Data Security: Regulatory Challenges and Potential Future Directions." Federal Law Review 45, no. 1 (March 2017): 65–95. http://dx.doi.org/10.1177/0067205x1704500104.

Повний текст джерела
Анотація:
This article considers the regulatory problems of online tracking behaviour, lack of consent to data collection, and the security of data collected with or without consent. Since the mid-1990s the United States Federal Trade Commission has been using its power under the United States consumer protection regime to regulate these problems. The Australian Competition and Consumer Commission (ACCC), on the other hand, has yet to bring civil or criminal proceedings for online privacy or data security breaches, which indicates a reluctance to employ the Australian Consumer Law (‘ACL’) in this field.1 Recent legislative action instead points to a greater application of the specifically targeted laws under the Privacy Act 1988 (Cth) (‘Privacy Act’), and the powers of the Office of the Australian Information Commissioner (OAIC), to protect consumer privacy and data security. This article contends that while specific legislation setting out, and publicly enforcing, businesses’ legal obligations with respect to online privacy and data protection is an appropriate regulatory response, the ACL's broad, general protections and public and/or private enforcement mechanisms also have a role to play in protecting consumer privacy and data security.
Стилі APA, Harvard, Vancouver, ISO та ін.
31

Froelicher, David, Patricia Egger, João Sá Sousa, Jean Louis Raisaro, Zhicong Huang, Christian Mouchet, Bryan Ford, and Jean-Pierre Hubaux. "UnLynx: A Decentralized System for Privacy-Conscious Data Sharing." Proceedings on Privacy Enhancing Technologies 2017, no. 4 (October 1, 2017): 232–50. http://dx.doi.org/10.1515/popets-2017-0047.

Повний текст джерела
Анотація:
Abstract Current solutions for privacy-preserving data sharing among multiple parties either depend on a centralized authority that must be trusted and provides only weakest-link security (e.g., the entity that manages private/secret cryptographic keys), or leverage on decentralized but impractical approaches (e.g., secure multi-party computation). When the data to be shared are of a sensitive nature and the number of data providers is high, these solutions are not appropriate. Therefore, we present UnLynx, a new decentralized system for efficient privacy-preserving data sharing. We consider m servers that constitute a collective authority whose goal is to verifiably compute on data sent from n data providers. UnLynx guarantees the confidentiality, unlinkability between data providers and their data, privacy of the end result and the correctness of computations by the servers. Furthermore, to support differentially private queries, UnLynx can collectively add noise under encryption. All of this is achieved through a combination of a set of new distributed and secure protocols that are based on homomorphic cryptography, verifiable shuffling and zero-knowledge proofs. UnLynx is highly parallelizable and modular by design as it enables multiple security/privacy vs. runtime tradeoffs. Our evaluation shows that UnLynx can execute a secure survey on 400,000 personal data records containing 5 encrypted attributes, distributed over 20 independent databases, for a total of 2,000,000 ciphertexts, in 24 minutes.
Стилі APA, Harvard, Vancouver, ISO та ін.
32

Maryanto, Maryanto, Maisyaroh Maisyaroh, and Budi Santoso. "Metode Internet Protocol Security (IPSec) Dengan Virtual Private Network (VPN) Untuk Komunikasi Data." PIKSEL : Penelitian Ilmu Komputer Sistem Embedded and Logic 6, no. 2 (September 18, 2018): 179–88. http://dx.doi.org/10.33558/piksel.v6i2.1508.

Повний текст джерела
Анотація:
Virtual Private Network (VPN) is a local communication network that is connected through a public network, with private network data security, data transfer closure from illegal access and network scalability to become the main standard in Virtual Private Network (VPN). In building a VPN at PT. Penas (Persero) conducted by the method of Internet Protocol Security (IP Sec). IP Sec works on the network layer, protects and authenticates communications on IP between hosts and functions both on IPv6 and IPv4 traffic. IP Sec is actually a feature that is owned by IPv6 but by some developers it was applied to IPv4. PT. Penas (Persero) is a subsidiary of PT. PPA (Persero), which in PT. Penas, the local network system and the internet and also data communication with PT. PPA (Persero) that are used are still very simple and vulnerable to the security of its data. The results of this study are implementing VPN with IP Sec method at PT. Penas, where with the concept of IP security, internet access in conducting data communication between PT. PPA (Persero) and PT. Penas can be done quickly, realtime, and confidential. Because basically VPN is a relatively safe way of networking because it uses encryption and special protocols to provide data security. Keywords: Networking, Secur, Virtual Private Network. Abstrak Virtual Private Network (VPN) merupakan suatu jaringan komunikasi lokal yang terhubung melalui jaringan publik, dengan private network keamanan data, ketertutupan transfer data dari akses ilegal serta skalabilitas jaringan menjadi standar utama dalam Virtual Private Network (VPN). Dalam membangun VPN pada PT.Penas (Persero) dilakukan dengan metode Internet Protocol Security (IP Sec). IP Sec bekerja pada lapisan network, memproteksi dan mengotentikasi komunikasi pada IP antara host dan berfungsi baik pada lalulintas IPv6 maupun IPv4. IP Sec sebenarnya adalah fitur yang dimiliki oleh IPv6 namun oleh beberapa developer diaplikasikan ke dalam IPv4. PT. Penas (Persero) merupakan anak perusahaan dari PT. PPA (Persero), yang mana pada PT.Penas ini, sistem jaringan lokal dan internet dan juga komunikasi data dengan PT.PPA (Persero) yang digunakan masih sangat sederhana dan rentan terhadap keamanan datanya. Hasil penelitian ini adalah mengimplementasikan VPN dengan metode IP Sec pada PT.Penas, dimana dengan konsep IP security ini akses internet dalam melakukan komunikasi data antara kantor Pusat PT.PPA (Persero) dengan PT.Penas dapat dilakukan secara cepat, realtime, dan rahasia. Karena pada dasarnya VPN itu cara jaringan yang relatif aman karena menggunakan enkripsi dan protokol khusus untuk memberikan keamanan data. Kata kunci: Jaringan, Keamanan, Virtual Private Network (VPN).
Стилі APA, Harvard, Vancouver, ISO та ін.
33

Benmalek, Mourad, Mohamed Ali Benrekia, and Yacine Challal. "Security of Federated Learning: Attacks, Defensive Mechanisms, and Challenges." Revue d'Intelligence Artificielle 36, no. 1 (February 28, 2022): 49–59. http://dx.doi.org/10.18280/ria.360106.

Повний текст джерела
Анотація:
Recently, a new Artificial Intelligence (AI) paradigm, known as Federated Learning (FL), has been introduced. It is a decentralized approach to apply Machine Learning (ML) on-device without risking the disclosure and tracing of sensitive and private information. Instead of training the global model on a centralized server (by aggregating the clients’ private data), FL trains a global shared model by only aggregating clients’ locally-computed updates (the clients’ private data remains distributed across the clients’ devices). However, as secure as the FL seems, it by itself does not give the levels of privacy and security required by today’s distributed systems. This paper seeks to provide a holistic view of FL’s security concerns. We outline the most important attacks and vulnerabilities that are highly relevant to FL systems. Then, we present the recent proposed defensive mechanisms. Finally, we highlight the outstanding challenges, and we discuss the possible future research directions.
Стилі APA, Harvard, Vancouver, ISO та ін.
34

Suleiman, James, and Terry Huston. "Data Privacy and Security." International Journal of Information Security and Privacy 3, no. 2 (April 2009): 42–53. http://dx.doi.org/10.4018/jisp.2009040103.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
35

Gaff, Brian M., Thomas J. Smedinghoff, and Socheth Sor. "Privacy and Data Security." Computer 45, no. 3 (March 2012): 8–10. http://dx.doi.org/10.1109/mc.2012.102.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
36

Adam, J. A. "Data security-cryptography=privacy?" IEEE Spectrum 29, no. 8 (August 1992): 29–35. http://dx.doi.org/10.1109/6.144533.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
37

Huang, Qinlong, Licheng Wang, and Yixian Yang. "Secure and Privacy-Preserving Data Sharing and Collaboration in Mobile Healthcare Social Networks of Smart Cities." Security and Communication Networks 2017 (2017): 1–12. http://dx.doi.org/10.1155/2017/6426495.

Повний текст джерела
Анотація:
Mobile healthcare social networks (MHSN) integrated with connected medical sensors and cloud-based health data storage provide preventive and curative health services in smart cities. The fusion of social data together with real-time health data facilitates a novel paradigm of healthcare big data analysis. However, the collaboration of healthcare and social network service providers may pose a series of security and privacy issues. In this paper, we propose a secure health and social data sharing and collaboration scheme in MHSN. To preserve the data privacy, we realize secure and fine-grained health data and social data sharing with attribute-based encryption and identity-based broadcast encryption techniques, respectively, which allows patients to share their private personal data securely. In order to achieve enhanced data collaboration, we allow the healthcare analyzers to access both the reencrypted health data and the social data with authorization from the data owner based on proxy reencryption. Specifically, most of the health data encryption and decryption computations are outsourced from resource-constrained mobile devices to a health cloud, and the decryption of the healthcare analyzer incurs a low cost. The security and performance analysis results show the security and efficiency of our scheme.
Стилі APA, Harvard, Vancouver, ISO та ін.
38

EL Azzaoui, Abir, Haotian Chen, So Hyeon Kim, Yi Pan, and Jong Hyuk Park. "Blockchain-Based Distributed Information Hiding Framework for Data Privacy Preserving in Medical Supply Chain Systems." Sensors 22, no. 4 (February 10, 2022): 1371. http://dx.doi.org/10.3390/s22041371.

Повний текст джерела
Анотація:
Medical supply chain communication networks engender critical information and data. Notably in the COVID era, inner personal and private information is being shared between healthcare providers regarding the medical supply chain. In recent years, multiple cyber-attacks have targeted medical supply chain communication networks due to their lack of security measures. In the era where cyber-attacks are cheaper and easier due to the computational power and various algorithms available for malicious uses, security, and data privacy requires intensive and higher measures. On the other hand, Information Hiding Techniques (IHT) compromise various advanced methods to hide sensitive information from being disclosed to malicious nodes. Moreover, with the support of Blockchain, IHT can bring higher security and the required privacy levels. In this paper, we propose the implementation of Blockchain and smart contract with the information hiding technique to enhance the security and privacy of data communication in critical systems, such as smart healthcare supply chain communication networks. Results show the feasibility of the framework using Hyperledger smart contract along with the desired security level.
Стилі APA, Harvard, Vancouver, ISO та ін.
39

Singh, Ajit, and Rimple Gilhotra. "Data Security Using Private Key Encryption System Based on Arithmetic Coding." International Journal of Network Security & Its Applications 3, no. 3 (May 31, 2011): 58–67. http://dx.doi.org/10.5121/ijnsa.2011.3305.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
40

Wang, Huiyong, Mingjun Luo, and Yong Ding. "Privacy-Preserving Fingerprint Authentication Using D-H Key Exchange and Secret Sharing." Security and Communication Networks 2021 (November 27, 2021): 1–12. http://dx.doi.org/10.1155/2021/5344696.

Повний текст джерела
Анотація:
Biometric based remote authentication has been widely deployed. However, there exist security and privacy issues to be addressed since biometric data includes sensitive information. To alleviate these concerns, we design a privacy-preserving fingerprint authentication technique based on Diffie-Hellman (D-H) key exchange and secret sharing. We employ secret sharing scheme to securely distribute fragments of critical private information around a distributed network or group, which softens the burden of the template storage center (TSC) and the users. To ensure the security of template data, the user’s original fingerprint template is stored in ciphertext format in TSC. Furthermore, the D-H key exchange protocol allows TSC and the user to encrypt the fingerprint template in each query using a random one-time key, so as to protect the user’s data privacy. Security analysis indicates that our scheme enjoys indistinguishability against chosen-plaintext attacks and user anonymity. Through experimental analysis, we demonstrate that our scheme can provide secure and accurate remote fingerprint authentication.
Стилі APA, Harvard, Vancouver, ISO та ін.
41

George, Jomin, and Takura Bhila. "Security, Confidentiality and Privacy in Health of Healthcare Data." International Journal of Trend in Scientific Research and Development Volume-3, Issue-4 (June 30, 2019): 373–77. http://dx.doi.org/10.31142/ijtsrd23780.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
42

Kumar.R, Dr Prasanna, Porselvan G, Prem Kumar S, and Robinlash F. "Security and Privacy Based Data Sharing in Cloud Computing." International Journal of Innovative Research in Engineering & Management 5, no. 1 (January 2018): 42–49. http://dx.doi.org/10.21276/ijirem.2018.5.1.9.

Повний текст джерела
Стилі APA, Harvard, Vancouver, ISO та ін.
43

V, Suma. "SECURITY AND PRIVACY MECHANISM USING BLOCKCHAIN." Journal of Ubiquitous Computing and Communication Technologies 01, no. 01 (September 23, 2019): 45–54. http://dx.doi.org/10.36548/jucct.2019.1.005.

Повний текст джерела
Анотація:
Block chain being a foundational technology impacting and attracting a wide range of applications has become predominant in solving the problem of privacy preserving and security in multitude sectors that is under the control of the government and the private. The paper also presents the security and the privacy mechanism using the block chain to prevent the misuse and the corruption in the sharing of huge set of data generated from the judiciary, security, legislature, commercial code registries etc. The proposed system enables reliability and the trust in the data sharing in the communication channels utilizing the block chain with the RSA digital signature. The proposed system is simulated as a java programming version to evince the enhancement in the latency in the sharing of the information’s along with the privacy and the security.
Стилі APA, Harvard, Vancouver, ISO та ін.
44

Zeng, Wen Ying, and Yue Long Zhao. "Mobile Storage and Data Security Management Research." Applied Mechanics and Materials 325-326 (June 2013): 1661–64. http://dx.doi.org/10.4028/www.scientific.net/amm.325-326.1661.

Повний текст джерела
Анотація:
The mobile storages especially in mobile devices hold a lot of important and private data. The portability and mobility may lead to loss and theft, therefore security problem of mobile storages and mobile data may suffer from troublesome and damage. TCG provides TPM for trust and security management. It is insufficient with mobile storage devices because mobile storage devices are often separated and load with heterogeneity and massive data. The paper analyzes the security management of mobile storages, proposed practical mobile storage and data security management methods and mechanisms, and illustrates mobile storages integration schemes for single storage device and multiple storages devices and cloud storage. The overall mobile storage and data security policies and methods should be performed urgently.
Стилі APA, Harvard, Vancouver, ISO та ін.
45

Helmiawan, Muhammad Agreindra, and Irfan Fadil. "PRIVATE CLOUD STORAGE IN RURAL'S MANAGEMENT AND INFORMATION SYSTEM USING ROADMAP FOR CLOUD COMPUTING ADOPTION (ROCCA)." INTERNAL (Information System Journal) 2, no. 2 (January 30, 2020): 172–83. http://dx.doi.org/10.32627/internal.v2i2.85.

Повний текст джерела
Анотація:
The draft Management Policy and Rural Information system are all articles with several articles governing all information security. In concerning Business Continuity Management it is written "The information system and security work unit backs up data periodically, to safer backing up data using Cloud computing facilities." Cloud computing has advantages as file management. Private cloud storage is a form of cloud computing that is intended for limited use in certain circles and one of its functions is used for backing up data or file management. On the other hand, there is software that can be used to implement private cloud storage, namely Owncloud. To run the Rural Information Security Policy Draft article on Business Continuity Management and for the provision of data centers, a study was conducted to implement private cloud storage using Owncloud. The method used in this study is the Roadmap for Cloud computing Adoption (ROCCA) with five stages, namely the stages of analysis, design, adoption, migration, and management. The results of this research are private cloud storage using Owncloud as a medium for storing, securing, and sharing files that are flexible and highly scalable that can be accessed via the internet by users.
Стилі APA, Harvard, Vancouver, ISO та ін.
46

Haughton, Suzette A., Trevor A. Smith, and Joakim Berndtsson. "Consumer Drivers of Industry Growth and Household Loyalty to Private Security Firms in Jamaica." Journal of Contemporary Criminal Justice 36, no. 1 (December 4, 2019): 110–27. http://dx.doi.org/10.1177/1043986219890204.

Повний текст джерела
Анотація:
Jamaica is the fourth most murderous country in the world with more than 100 murders per 100,000 population. Private security firms have grown to record levels and have outnumbered the police and military combined, thus making private security an extremely important part of the security landscape in the country. This article seeks to explain household loyalty to private security providers and the rapid growth of private policing and protection in the country. Prior research has rarely addressed this issue, particularly in a developing world context. Utilizing a final sample of 108 private security customers in Jamaica and partial least squares structural equation modeling (PLS-SEM) for data analysis, the study finds that good relationships between customers and security providers and the service quality offered by private security firms are key drivers of household loyalty. In addition, lack of confidence in the police, service quality offered, and the high levels of “indiscipline” in the Jamaican society are causal to the increased growth in the private security industry.
Стилі APA, Harvard, Vancouver, ISO та ін.
47

Diers-Lawson, Audra, and Amelia Symons. "Mind the gap: Understanding stakeholder reactions to different types of data security." Proceedings of the International Crisis and Risk Communication Conference 3 (March 11, 2020): 25–28. http://dx.doi.org/10.30658/icrcc.2020.6.

Повний текст джерела
Анотація:
Data security breaches are an increasingly common problem for organizations, yet there are critical gaps in our understanding of how different stakeholders understand and evaluate organizations that have experienced these kinds of security breaches. While organizations have developed relatively standard approaches to responding to security breaches that: (1) acknowledge the situation; (2) highlight how much they value their stakeholders’ privacy and private information; and (3) focus on correcting and preventing the problem in the future, the effectiveness of this response strategy and factors influencing it have not been adequately explored. This experiment focuses on a 2 (type of organization) x 2 (prior knowledge of breach risk) with a control group design. Findings suggest that perceptions of competence is the most important factor influencing outcome variables like behavioral intention and social responsibility evaluations.
Стилі APA, Harvard, Vancouver, ISO та ін.
48

Noh, Geontae, Ji Young Chun, and Ik Rae Jeong. "Sharing Privacy Protected and Statistically Sound Clinical Research Data Using Outsourced Data Storage." Journal of Applied Mathematics 2014 (2014): 1–12. http://dx.doi.org/10.1155/2014/381361.

Повний текст джерела
Анотація:
It is critical to scientific progress to share clinical research data stored in outsourced generally available cloud computing services. Researchers are able to obtain valuable information that they would not otherwise be able to access; however, privacy concerns arise when sharing clinical data in these outsourced publicly available data storage services. HIPAA requires researchers to deidentify private information when disclosing clinical data for research purposes and describes two available methods for doing so. Unfortunately, both techniques degrade statistical accuracy. Therefore, the need to protect privacy presents a significant problem for data sharing between hospitals and researchers. In this paper, we propose a controlled secure aggregation protocol to secure both privacy and accuracy when researchers outsource their clinical research data for sharing. Since clinical data must remain private beyond a patient’s lifetime, we take advantage of lattice-based homomorphic encryption to guarantee long-term security against quantum computing attacks. Using lattice-based homomorphic encryption, we design an aggregation protocol that aggregates outsourced ciphertexts under distinct public keys. It enables researchers to get aggregated results from outsourced ciphertexts of distinct researchers. To the best of our knowledge, our protocol is the first aggregation protocol which can aggregate ciphertexts which are encrypted with distinct public keys.
Стилі APA, Harvard, Vancouver, ISO та ін.
49

Li, Ye, Zoe L. Jiang, Xuan Wang, Junbin Fang, En Zhang, and Xianmin Wang. "Securely Outsourcing ID3 Decision Tree in Cloud Computing." Wireless Communications and Mobile Computing 2018 (October 4, 2018): 1–10. http://dx.doi.org/10.1155/2018/2385150.

Повний текст джерела
Анотація:
With the wide application of Internet of Things (IoT), a huge number of data are collected from IoT networks and are required to be processed, such as data mining. Although it is popular to outsource storage and computation to cloud, it may invade privacy of participants’ information. Cryptography-based privacy-preserving data mining has been proposed to protect the privacy of participating parties’ data for this process. However, it is still an open problem to handle with multiparticipant’s ciphertext computation and analysis. And these algorithms rely on the semihonest security model which requires all parties to follow the protocol rules. In this paper, we address the challenge of outsourcing ID3 decision tree algorithm in the malicious model. Particularly, to securely store and compute private data, the two-participant symmetric homomorphic encryption supporting addition and multiplication is proposed. To keep from malicious behaviors of cloud computing server, the secure garbled circuits are adopted to propose the privacy-preserving weight average protocol. Security and performance are analyzed.
Стилі APA, Harvard, Vancouver, ISO та ін.
50

Pelau, Corina, Mihaela Stanescu, and Daniela Serban. "Big-Data and Consumer Profiles – The hidden traps of data collection on social media networks." Proceedings of the International Conference on Business Excellence 13, no. 1 (May 1, 2019): 1070–78. http://dx.doi.org/10.2478/picbe-2019-0093.

Повний текст джерела
Анотація:
Abstract The development and increased popularity of the social media networks has changed the way consumers communicate and interact with each other. But besides the positive aspects regarding socializing, real-time communication and information sharing, the social media networks have also several disadvantages. Private data security, invasion of privacy, misuse of information are just some of the negative aspects associated to social media networks, of which many of the consumers are not aware. This paper gives an overview of the different methods in which private consumer data and consumer profiles are created with the help of social media networks. The paper focuses on three main components, namely the data provided by the consumers, the technologies that have the ability to collect data in an aware or unaware manner and the contribution and advantages of business in this process. The results show that some of the data are given by the consumer, while other are just gathered with the help of automated and intelligent systems or applications.
Стилі APA, Harvard, Vancouver, ISO та ін.
Ми пропонуємо знижки на всі преміум-плани для авторів, чиї праці увійшли до тематичних добірок літератури. Зв'яжіться з нами, щоб отримати унікальний промокод!

До бібліографії