Using Copies to Remove Sensitive Data: A Case Study on Fair Superhero Alignment Prediction

Author(s):  
Irene Unceta ◽  
Jordi Nin ◽  
Oriol Pujol
Keyword(s):  
Author(s):  
Zarni Sann ◽  
Thi thi Soe ◽  
Kaythi Wyut Mhone Knin ◽  
Zin May Win

Encryption is a well known technology for protecting sensitive data. ElGamal encryption and RSA algorithm is made before storing mails to mail server. ElGamal decryption and RSA decryption is made after retrieving mails from mail server. This system is implemented to secure mail server system for local government’s important mail messages. These algorithms consume a considerable amount of time and resources such as memory, CPU time, and computation time to encrypt and decrypt data. In this paper, the results are comparison of these algorithms in term of encryption time, decryption time, and memory usage over variable file sizes. After processing, it is proven that RSA performs a faster encryption process than ElGamal. However, ElGamal decryption process is faster than RSA. This system is also expressed comparison of storage Size between RSA and ElGamal. Both of these algorithms are cryptographic public-key algorithms but have functions in different ways. This system is using C# programming language and SQL Server to store mail messages.


2021 ◽  
Vol 27 (7) ◽  
pp. 650-666
Author(s):  
Xabier Larrucea ◽  
Micha Moffie ◽  
Dan Mor

Since the emergence of GDPR, several industries and sectors are setting informatics solutions for fulfilling these rules. The Health sector is considered a critical sector within the Industry 4.0 because it manages sensitive data, and National Health Services are responsible for managing patients’ data. European NHS are converging to a connected system allowing the exchange of sensitive information cross different countries. This paper defines and implements a set of tools for extending the reference architectural model industry 4.0 for the healthcare sector, which are used for enhancing GDPR compliance. These tools are dealing with data sensitivity and data hiding tools A case study illustrates the use of these tools and how they are integrated with the reference architectural model.


Author(s):  
El-Sayed M. El-Alfy

Protecting confidentiality of sensitive data is growing in importance in many personal, commercial, governmental, medical and military applications. Data encryption remains the most prevalent mechanism for this goal in cybersecurity to store and communicate data in unintelligible form. However, images are known to have intrinsic characteristics different from text, which limit the applicability of conventional cryptographic algorithms. This chapter provides a review of the work related to image cryptosystems based on chaos theory and biologically-inspired algorithms. Then, a case study is presented using ideas from genetic crossover and mutation to confuse and diffuse images to generate secure cipher images with very low correlation between pixels.


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Charbel Chedrawi ◽  
Yara Atallah

Purpose This paper aims to dynamically analyze the opportunities and challenges of AI in the defense sector in Lebanon or any security agency or any organization with sensitive data through a resource-based view perspective, the adoption of artificial intelligence (AI)/narrow AI applications in the Lebanese Armed Forces (LAF) and to diagnose the current strategic orientation toward innovation and technology within the LAF while avoiding isomorphism. Design/methodology/approach The methodology is based on a qualitative interpretive case-study approach collected from several departments of the LAF. In fact, there is a developing convention to use qualitative research approaches among which case studies to study information technology phenomena (Trauth and Jessup, 2000; Benbasat et al., 1987; Klein and Meyers, 1999). Data were collected through centered semi-structured in-depth interviews (two to three hours each) with an interview guide coded abductively between the researchers and the interviewees conducted in numerous departments of the LAF with their top officials and generals (O1, O2, O3…); the anonymity of the interviewees was kept due to the sensitivity of the data collected, which took place between September 2018 and March 2019. Data consolidation and processing were conducted using NVivo. Findings This paper shows that the LAF is undeniably facing many challenges among which isomorphism caused by the lack of resources; it also shows that narrow AI applications provide new avenues for the LAF to avoid such institutional isomorphism. Originality/value The role of narrow AI in limiting isomorphism in the defense sector.


Inventions ◽  
2021 ◽  
Vol 6 (3) ◽  
pp. 45
Author(s):  
Prathamesh Churi ◽  
Ambika Pawar ◽  
Antonio-José Moreno-Guerrero

Background: According to the renowned and Oscar award-winning American actor and film director Marlon Brando, “privacy is not something that I am merely entitled to, it is an absolute prerequisite.” Privacy threats and data breaches occur daily, and countries are mitigating the consequences caused by privacy and data breaches. The Indian healthcare industry is one of the largest and rapidly developing industry. Overall, healthcare management is changing from disease-centric into patient-centric systems. Healthcare data analysis also plays a crucial role in healthcare management, and the privacy of patient records must receive equal attention. Purpose: This paper mainly presents the utility and privacy factors of the Indian healthcare data and discusses the utility aspect and privacy problems concerning Indian healthcare systems. It defines policies that reform Indian healthcare systems. The case study of the NITI Aayog report is presented to explain how reformation occurs in Indian healthcare systems. Findings: It is found that there have been numerous research studies conducted on Indian healthcare data across all dimensions; however, privacy problems in healthcare, specifically in India, are caused by prevalent complacency, culture, politics, budget limitations, large population, and existing infrastructures. This paper reviews the Indian healthcare system and the applications that drive it. Additionally, the paper also maps that how privacy issues are happening in every healthcare sector in India. Originality/Value: To understand these factors and gain insights, understanding Indian healthcare systems first is crucial. To the best of our knowledge, we found no recent papers that thoroughly reviewed the Indian healthcare system and its privacy issues. The paper is original in terms of its overview of the healthcare system and privacy issues. Social Implications: Privacy has been the most ignored part of the Indian healthcare system. With India being a country with a population of 130 billion, much healthcare data are generated every day. The chances of data breaches and other privacy violations on such sensitive data cannot be avoided as they cause severe concerns for individuals. This paper segregates the healthcare system’s advances and lists the privacy that needs to be addressed first.


2021 ◽  
Vol 35 (35) ◽  
pp. 82-99
Author(s):  
Kaisa Liekovuori ◽  
Samu Rautio ◽  
Aatu Härkönen

Background: The current research brings up the perspective of security-critical information systems in shared parameter databases in the context of processing sensitive data at Finnish Naval Warfare Centre. It refers to the environment of isolated military war gaming simulation and modeling systems. The research problem is: How to make an optimal solution for data distribution in different military war gaming simulation and modeling software? Objectives: The objective is to create a single shared database usable with different detail level software, e.g. high-level scenario simulation, technical system-of-system simulations, and system-level physical simulations. Methods: The methods are modeling, simulation and operation analysis. The approach is inductive, the strategy is a qualitative case study and the data collection was implemented by exploring database models and their combinations. The integration was implemented in an object-relational database management system (ORDBMS), PostgreSQL. Results: The shared database led to efficient access to simulation parameters, more straightforward system integration and improved scalability. Conclusions: The results of modeling and simulation indicated that the integration is possible to implement.


2016 ◽  
Vol 2016 ◽  
pp. 1-20
Author(s):  
Busra Ozdenizci ◽  
Kerem Ok ◽  
Vedat Coskun

Following the announcement of Host Card Emulation (HCE) technology, card emulation mode based Near Field Communication (NFC) services have gained further appreciation as an enabler of the Cloud-based Secure Element (SE) concept. A comprehensive and complete architecture with a centralized and feasible business model for diverse HCE-based NFC services will be highly appreciated, particularly by Service Providers and users. To satisfy the need in this new emerging research area, a Tokenization-based communication architecture for HCE-based NFC services is presented in this paper. Our architecture proposes Two-Phased Tokenization to enable the identity management of both user and Service Provider. NFC Smartphone users can store, manage, and make use of their sensitive data on the Cloud for NFC services; Service Providers can also provide diverse card emulation NFC services easily through the proposed architecture. In this paper, we initially present the Two-Phased Tokenization model and then validate the proposed architecture by providing a case study on access control. We further evaluate the usability aspect in terms of an authentication scheme. We then discuss the ecosystem and business model comprised of the proposed architecture and emphasize the contributions to ecosystem actors. Finally, suggestions are provided for data protection in transit and at rest.


2009 ◽  
pp. 2198-2213
Author(s):  
Claudio Agostino Ardagna ◽  
Ernesto Damiani ◽  
Fulvio Frati ◽  
Salvatore Reale

The widespread diffusion of online services provided by public and private organizations, firstly driven by e-commerce and more recently by egovernment applications, has stressed the need of secure ways to authenticate users who need to access online resources. The huge number of resources accessible on the Web leads to different authentication mechanisms implementations that often require multiple log-on actions also in intradomain multiservices scenario. In case of high sensitive services, users’ authentication plays a role of paramount importance. In this article is presented a case study that gives a roadmap of authentication mechanisms implemented at different levels of services’ software structure. The discussion starts by illustrating different authentication solutions implemented at operating system, application server or components level to conclude with Single Sign-On approach. For each solution, pros and cons are discussed. The SSO system, called CAS++, developed as an extension to Yale University’s CAS, is then presented.


Author(s):  
Dawn-Marie Turner ◽  
Sunil Hazari

Wireless technology has broad implications for the healthcare environment. Despite its promise, this new technology has raised questions about security and privacy of sensitive data that is prevalent in healthcare organizations. All healthcare organizations are governed by legislation and regulations, and the implementation of enterprise applications using new technology is comparatively more difficult than in other industries. Using a configuration-idiographic case-study approach, this study investigated challenges faced by two Canadian healthcare organizations. In addition to interviews with management and staff of the organizations, a walk-through was also conducted to observe and collect first-hand data of the implementation of wire-less technology in the clinical environment. In the organizations under examination, it was found that wireless technology is being implemented gradually to augment the wired network. Problems associated with implementing wireless technology in these Canadian organizations are also discussed. Because of different standards in this technology, the two organizations are following different upgrade paths. Based on the data collected, best practices for secure wireless access in these organizations are proposed.


2018 ◽  
Vol 4 (2) ◽  
pp. 205630511876829
Author(s):  
Ben Light ◽  
Peta Mitchell ◽  
Patrik Wikström

With the rise of geo-social media, location is emerging as a particularly sensitive data point for big data and digital media research. To explore this area, we reflect on our ethics for a study in which we analyze data generated via an app that facilitates public sex among men who have sex with men. The ethical sensitivities around location are further heightened in the context of research into such digital sexual cultures. Public sexual cultures involving men who have sex with men operate both in spaces “meant” for public sex (e.g., gay saunas and dark rooms) and spaces “not meant” for public sex (e.g., shopping centers and public toilets). The app in question facilitates this activity. We developed a web scraper that carefully collected selected data from the app and that data were then analyzed to help identify ethical issues. We used a mixture of content analysis using Python scripts, geovisualisation software and manual qualitative coding techniques. Our findings, which are methodological rather than theoretical in nature, center on the ethics associated with generating, processing, presenting, archiving and deleting big data in a context where harassment, imprisonment, physical harm and even death occur. We find a tension in normal standards of ethical conduct where humans are involved in research. We found that location came to the fore as a key—though not the only—actor requiring attention when considering ethics in a big data context.


Sign in / Sign up

Export Citation Format

Share Document