Secure Data Archiving Using Enhanced Data Retention Policies

Author(s):  
H. Sabireen ◽  
S. Kirthica ◽  
Rajeswari Sridhar
2012 ◽  
Vol 9 (4) ◽  
pp. 393-406 ◽  
Author(s):  
J. Li ◽  
S. Singhal ◽  
R. Swaminathan ◽  
A. H. Karp

2019 ◽  
Vol 2019 (4) ◽  
pp. 250-271 ◽  
Author(s):  
Nathan Malkin ◽  
Joe Deatrick ◽  
Allen Tong ◽  
Primal Wijesekera ◽  
Serge Egelman ◽  
...  

Abstract As devices with always-on microphones located in people’s homes, smart speakers have significant privacy implications. We surveyed smart speaker owners about their beliefs, attitudes, and concerns about the recordings that are made and shared by their devices. To ground participants’ responses in concrete interactions, rather than collecting their opinions abstractly, we framed our survey around randomly selected recordings of saved interactions with their devices. We surveyed 116 owners of Amazon and Google smart speakers and found that almost half did not know that their recordings were being permanently stored and that they could review them; only a quarter reported reviewing interactions, and very few had ever deleted any. While participants did not consider their own recordings especially sensitive, they were more protective of others’ recordings (such as children and guests) and were strongly opposed to use of their data by third parties or for advertising. They also considered permanent retention, the status quo, unsatisfactory. Based on our findings, we make recommendations for more agreeable data retention policies and future privacy controls.


2002 ◽  
Vol 18 (5) ◽  
pp. 333-337 ◽  
Author(s):  
Rowan Middleton ◽  
Herbert Smith

Author(s):  
Florin Vancea ◽  
Codruţa Vancea ◽  
Daniela Elena Popescu ◽  
Doina Zmaranda ◽  
Gianina Gabor

In today’s world communication is relying heavily on electronic means, both for voice and other native data. All these communication sessions leave behind journaling information by the very nature of the underlying services. This information is both sensitive with respect to user’s rights and important for law enforcement purposes, so proper storage and retrieval techniques have to be taken into consideration. The paper discusses such techniques in relation with recent EU recommendations and suggests some methods for achieving good performance while preserving the required security levels.


2017 ◽  
Vol 2 (1) ◽  
pp. 3
Author(s):  
Michael Zimmer

Within libraries, a patron’s intellectual activities are protected by decades of established norms and practices intended to preserve patron privacy and confidentiality, most stemming from the American Library Association’s Library Bill of Rights and related interpretations. As a matter of professional ethics, most librarians protect patron privacy by engaging in limited tracking of user activities, instituting short-term data retention policies, and generally enabling the anonymous browsing of materials. These are the existing privacy norms within the library context, and the cornerstone of what makes up the “librarian ethic.”


2017 ◽  
Vol 1 (1) ◽  
Author(s):  
Sherly Gina Supratman

AbstrakJaringan Komunikasi seperti Internet� merupakan jaringan yang tidak aman untuk mentransmisi data, seperti teks, audio,video dan citra digital. Salah satu cara untuk pengamanan data dapat dilakukan dengan menggunakan proses kriptografi dan �steganografi. Penggunaan ini dengan tujuan untuk merahasiakan pesan yang dikirim dan sekaligus menghindarkan pesan tersebut dari kecurigaan pihak lain yang tidak berkepentingan.Pesan yang digunakan dalam makalah ini adalah berupa text dengan menyisipkannya pada gambar. Pada proses kriptografi, pesan yang berupa text akan dienkrip dengan algoritma Hill Chiper, dan kemudian pesan yang telah dienkrip akan dilakukan proses steganografi pada citra digital� 8 bit dengan skala 0 � 255, dengan metode Least Significant Bit ( LSB ).�Kata kunci: Kriptografi, Hill Chiper, Steganografi, Least Significant Bit�AbstractCommunication Networks such as the Internet are unsafe networks for transmitting data, such as text, audio, video and digital imagery. One way to secure data can be done by using cryptography and steganography process. This use is for the purpose of concealing messages being transmitted and avoiding such messages from the suspicion by others who are not interested.The message used in this paper is text by inserting it in the image. In the cryptographic process, text messages will be encrypted with the Hill Chiper algorithm, and then the encrypted message will be steganographed on 8-bit digital images on a scale of 0-255, using the Least Significant Bit (LSB) method.�Keywords: Cryptography, Hill Chiper, Steganography, Least Significant Bit


1990 ◽  
Author(s):  
J. GREEN ◽  
K. KLENK ◽  
L. TREINISH
Keyword(s):  

2018 ◽  
Vol 6 (9) ◽  
pp. 723-731
Author(s):  
Rakesh Prasad Sarang ◽  
Anshu Chaturvedi ◽  
D.N. Goswami

Sign in / Sign up

Export Citation Format

Share Document