Guideline for Architectural Safety, Security and Privacy Implementations Using Design Patterns: SECREDAS Approach

2021 ◽  
pp. 39-51
Author(s):  
Nadja Marko ◽  
Joaquim Maria Castella Triginer ◽  
Christoph Striecks ◽  
Tobias Braun ◽  
Reinhard Schwarz ◽  
...  
Author(s):  
Wassim Itani ◽  
Ayman Kayssi ◽  
Ali Chehab

In this paper, the authors provide a detailed overview and technical discussion and analysis of the latest research trends in securing body sensor networks. The core of this work aims at: (1) identifying the resource limitations and energy challenges of this category of wireless sensor networks, (2) considering the life-critical applications and emergency contexts that are encompassed by body sensor network services, and (3) studying the effect of these peculiarities on the design and implementation of rigorous and efficient security algorithms and protocols. The survey discusses the main advancements in the design of body sensor network cryptographic services (key generation and management, authentication, confidentiality, integrity, and privacy) and sheds the light on the prominent developments achieved in the field of securing body sensor network data in Cloud computing architectures. The elastic virtualization mechanisms employed in the Cloud, as well as the lucrative computing and storage resources available, makes the integration of body sensor network applications, and Cloud platforms a natural choice that is packed with various security and privacy challenges. The work presented in this paper focuses on Cloud privacy and integrity mechanisms that rely on tamper-proof hardware and energy-efficient cryptographic data structures that are proving to be well-suited for operation in untrusted Cloud environments. This paper also examines two crucial design patterns that lie at the crux of any successful body sensor network deployment which are represented in: (1) attaining the right balance between the degree, complexity, span, and strength of the cryptographic operations employed and the energy resources they consume. (2) Achieving a feasible tradeoff between the privacy of the human subject wearing the body sensor network and the safety of this subject. This is done by a careful analysis of the medical status of the subject and other context-related information to control the degree of disclosure of sensitive medical data. The paper concludes by presenting a practical overview of the cryptographic support in the main body sensor network development frameworks such and TinyOS and SPINE and introduces a set of generalized guideline patterns and recommendations for designing and implementing cryptographic protocols in body sensor network environments.


Author(s):  
Uppuluri Sirisha ◽  
G. Lakshme Eswari

This paper briefly introduces Internet of Things(IOT) as a intellectual connectivity among the physical objects or devices which are gaining massive increase in the fields like efficiency, quality of life and business growth. IOT is a global network which is interconnecting around 46 million smart meters in U.S. alone with 1.1 billion data points per day[1]. The total installation base of IOT connecting devices would increase to 75.44 billion globally by 2025 with a increase in growth in business, productivity, government efficiency, lifestyle, etc., This paper familiarizes the serious concern such as effective security and privacy to ensure exact and accurate confidentiality, integrity, authentication access control among the devices.


Author(s):  
Shaveta Bhatia

 The epoch of the big data presents many opportunities for the development in the range of data science, biomedical research cyber security, and cloud computing. Nowadays the big data gained popularity.  It also invites many provocations and upshot in the security and privacy of the big data. There are various type of threats, attacks such as leakage of data, the third party tries to access, viruses and vulnerability that stand against the security of the big data. This paper will discuss about the security threats and their approximate method in the field of biomedical research, cyber security and cloud computing.


2017 ◽  
Vol 3 (2) ◽  
pp. 29
Author(s):  
NURHAZIRAH HASHIM ◽  
MOHAMMAD ZAIM MOHD SALLEH ◽  
NOR SARA NADIA MUHAMAD YUNUS ◽  
INTAN SYAFINAZ MAT SHAFIE

The recent development in the ecommerce services has shown a variety of established companies participating in the web business environment including Islamic banks. Business with the mostexperience and success in using ecommerce are beginning to realize that the indicator of success or failure of the ecommerce environment was included in the online services. Nowadays, the trend ofa business is to serve the customer with best quality of services to enhance the consumer satisfaction and compete with the global competitors as online services enabled registered user to make productspurchase transaction only through website such as check and manage financial standing, transfer funds, bill payment, prepaid reload and so forth. However, in recent times, Islamic banking users faced problems with the online system such as cannot log in to the system, payment failure and  mostly security and privacy hindrance. Therefore, this study aimed to investigate the relationship between electronic service quality (e-SERVQUAL) and customer satisfaction towards IslamicOnline Banking Services users. Based on the sample size, only 76 respondents were selected to participate in this study by using a convenience sampling. Further, Pearson correlation and multipleregression were reported to analyze the mentioned relationship. The findings have shown that there is a positive relationship between e-SERVQUAL and customer satisfaction in using Islamic onlinebanking services. Based on the findings, Islamic online banking developer is recommended to improve more on their responsiveness in order to provide quick response to their customer’s requirements.  Moreover, they also should be more reliable in providing accurate information in performing the promised services. They must assure that all of their customers can quickly get responds and true feedback regarding their problems to ensure customer satisfy with service provided. Besides, the safety of the website and the protection of customer information alsoconsidered a vital action that should be concerned in order to increase the customers’ satisfaction.


Sign in / Sign up

Export Citation Format

Share Document