Data Sharing and Data Security

Author(s):  
Jules J. Berman
Keyword(s):  
2019 ◽  
Vol 13 (4) ◽  
pp. 356-363
Author(s):  
Yuezhong Wu ◽  
Wei Chen ◽  
Shuhong Chen ◽  
Guojun Wang ◽  
Changyun Li

Background: Cloud storage is generally used to provide on-demand services with sufficient scalability in an efficient network environment, and various encryption algorithms are typically applied to protect the data in the cloud. However, it is non-trivial to obtain the original data after encryption and efficient methods are needed to access the original data. Methods: In this paper, we propose a new user-controlled and efficient encrypted data sharing model in cloud storage. It preprocesses user data to ensure the confidentiality and integrity based on triple encryption scheme of CP-ABE ciphertext access control mechanism and integrity verification. Moreover, it adopts secondary screening program to achieve efficient ciphertext retrieval by using distributed Lucene technology and fine-grained decision tree. In this way, when a trustworthy third party is introduced, the security and reliability of data sharing can be guaranteed. To provide data security and efficient retrieval, we also combine active user with active system. Results: Experimental results show that the proposed model can ensure data security in cloud storage services platform as well as enhance the operational performance of data sharing. Conclusion: The proposed security sharing mechanism works well in an actual cloud storage environment.


Author(s):  
Chandrakala B M ◽  
S C Lingareddy

<p>In recent days, data sharing has provided the flexibility to share the data, store the data, and perform operation on data virtually as well as cost effectively. Data sharing in cloud is one of the feature, which is being popular and widely accepted. However, the concern here is to ensure the data security and this has led the researcher to research in this area. To provide the security several Proxy re-encryption scheme has been introduced, however all these method lacks of efficiency. Hence In this paper, we propose a scheme known as ALBC (Adaptive Lattice Based Cryptography), this scheme follows the two phase i.e. encryption and Re-encryption. Encryption phase has few algorithms such as Key_Gen, Enc, Dec. Similarly ALBC Re-Enc has five algorithm i.e. Key_Gen, Key_ReGen,  Enc, Re-Enc, Dec. our algorithm not only provides the security but also solves the problem of RL(Ring-learning) with errors problems. In order to evaluate, our algorithm is compared with the existing model in terms of encryption time, decryption time, re-encryption time, key generation  and key regeneration by varying the various key size. When we observe the comparative analysis, it is observed that our algorithm outperforms the existing algorithm.</p>


Author(s):  
Xinjie Cui ◽  
Robyn Blackadar

ABSTRACT ObjectivesUsing existing data for research can generate new knowledge and evidence for policy with relatively little cost. Privacy concerns are paramount in such secondary usage of data collected on human subjects. Information privacy protection and data security are critical considerations in reuse and repurposing of data especially linked data, longitudinal data, and large amounts of data. Data sharing and privacy protection are both in the public interest and we need to assess the risk of “doing” (sharing) as well as the risk of “not doing” (not sharing or not protecting).    ApproachThe Alberta Centre for Child Family and Community Research (the Centre) establishes the Child Youth Data Lab that links and analyzes administrative data from multiple provincial ministries and the Child Data Centre of Alberta that repurposes research data and manages its access for reuse. The Centre partners with provincial Office of the Information Privacy Commissioner, Research Ethics Boards and leaders in the research communities and technology industry to design and develop measures to enable secondary use while safeguarding the data, and to explore and adopt best practices on data sharing processes, governance, and technologies. ResultsIn principle current privacy laws and regulations provide good guidance in collection, use, and disclosure of data, however there is a lack of consistency in the interpretation of these laws at the operational level with regard to secondary data use. The experiences of establishing different data sharing models at the Centre through multiple initiatives are discussed. Cross-sectoral broad partnership brings understanding and builds trusting relationships, which are crucial to establishing data sharing processes. The recognition of the significance of secondary data use to provide direction for policy and program development at the executive level provides commitment for data sharing initiatives. Strong governance structure consists multi-level ministry and multiple stakeholder involvement ensures ongoing support and engagement. The highest data security standards and anonymous solution for data linkage enables the sharing of data with good privacy protection. ConclusionSecondary use of data to improve system performance and contributing to scientific discovery has been broadly recognized. A balance between utility and privacy can be realized through broad partnership in building proper governance, technology, processes and policies.


2020 ◽  
Author(s):  
Tamra Lysaght ◽  
Angela Ballantyne ◽  
Vicki Xafis ◽  
Serene Ong ◽  
Gerald Owen Schaefer ◽  
...  

Abstract Background We aimed to examine the ethical concerns Singaporeans have about sharing health-data for precision medicine (PM) and identify suggestions for governance strategies. Just as Asian genomes are under-represented in PM, the views of Asian populations about the risks and benefits of data sharing are under-represented in prior attitudinal research.Methods We conducted seven focus groups with 62 participants in Singapore from May to July 2019. They were conducted in three languages (English, Mandarin and Malay) and analysed with qualitative content and thematic analysis. Results Four key themes emerged: nuanced understandings of data security and data sensitivity; trade-offs between data protection and research benefits; trust (and distrust) in the public and private sectors; and governance and control options. Participants were aware of the inherent risks associated with data sharing for research. Participants expressed conditional support for data sharing, including genomic sequence data and information contained within electronic medical records. This support included sharing data with researchers from universities and healthcare institutions, both in Singapore and overseas. Support was conditional on the perceived social value of the research and appropriate de-identification and data security processes. Participants suggested that a data sharing oversight body would help strengthen public trust and comfort in data research for PM in Singapore.Conclusion Maintenance of public trust in data security systems and governance regimes can enhance participation in PM and data sharing for research. Contrary to themes in much prior research, participants demonstrated a sophisticated understanding of the inherent risks of data sharing, analysed trade-offs between risks and potential benefits of PM, and often adopted an international perspective.


2020 ◽  
Author(s):  
Jill Evans ◽  
Paul Biggs ◽  
Mark Elliott

Abstract Background: Osteoarthritis is a heterogeneous condition characterised by a wide variety of factors and represents a worldwide healthcare challenge. There are multiple clinical and research specialisms involved in the diagnosis, prognosis and treatment of osteoarthritis, and there may be opportunities to share or pool data which are currently not being utilised. However, there are challenges to doing so which require carefully structured solutions and partnership working.Methods: Interviews were conducted with nine experts from various fields within osteoarthritis research. A semi-structured approach was used, and thematic analysis applied to the results.Results: Generally, osteoarthritis researchers were supportive of data sharing, provided it is done responsibly and without impacting data integrity. Benefits identified included increasing typically low-powered data, the potential for machine learning opportunities, and the potential for improved patient outcomes. However, a number of challenges were identified, in particular related to; data security, data harmonisation, storage costs, ethical considerations and governance.Conclusions: There is clear support for increased data sharing and partnership working in osteoarthritis research. Further investigation will be required to navigate the complex issues identified; however, it is clear that collaborative opportunities should be better facilitated and there may be innovative ways to do this. It is also clear that nomenclature within different disciplines could be better streamlined, to improve existing opportunities to harmonise data.


2020 ◽  
Vol 5 (19) ◽  
pp. 26-31
Author(s):  
Md. Farooque ◽  
Kailash Patidar ◽  
Rishi Kushwah ◽  
Gaurav Saxena

In this paper an efficient security mechanism has been adopted for the cloud computing environment. It also provides an extendibility of cloud computing environment with big data and Internet of Things. AES-256 and RC6 with two round key generation have been applied for data and application security. Three-way security mechanism has been adopted and implemented. It is user to user (U to U) for data sharing and inter cloud communication. Then user to cloud (U to C) for data security management for application level hierarchy of cloud. Finally, cloud to user (C to U) for the cloud data protection. The security analysis has been tested with different iterations and rounds and it is found to be satisfactory.


2020 ◽  
Vol 14 (1) ◽  
pp. 44-66 ◽  
Author(s):  
Neha Agarwal ◽  
Ajay Rana ◽  
J.P. Pandey ◽  
Amit Agarwal

Cloud computing is an emergent computing paradigm; however, data security is a significant issue in recent time while outsourcing the data to the cloud preventing users to upload their data on cloud. The data forwarded to cloud can be protected using some cryptographic techniques based on identity, attributes, and prediction. But these algorithms lack their performance when a revoked user collude with cloud; therefore, it becomes essential to develop a secure data sharing framework with some enhanced cryptographic techniques. The proposed methodology presented a secure privacy preserving data sharing with encryption technique called dynamic unidirectional proxy re-encryption (PRE) with cipher text policy attribute-based encryption. The technique ensures the privacy, integrity, and security of the data while retrieving through the cloud. The framework is implemented in the cloud sim with java language. Experimental results proved that proposed frame work attains reasonable results compared to traditional methods.


2020 ◽  
Author(s):  
Tamra Lysaght ◽  
Angela Ballantyne ◽  
Vicki Xafis ◽  
Serene Ong ◽  
Gerald Owen Schaefer ◽  
...  

Abstract Background We aimed to examine the ethical concerns Singaporeans have about sharing health-data for precision medicine (PM) and identify suggestions for governance strategies. Just as Asian genomes are under-represented in PM, the views of Asian populations about the risks and benefits of data sharing are under-represented in prior attitudinal research.Methods We conducted seven focus groups with 62 participants in Singapore from May to July 2019. They were conducted in three languages (English, Mandarin and Malay) and analysed with qualitative content and thematic analysis. Results Four key themes emerged: nuanced understandings of data security and data sensitivity; trades-offs between data protection and research benefits; trust (and distrust) in the public and private sectors; and governance and control options. Participants were aware of the inherent risks associated with data sharing for research. Participants expressed conditional support for data sharing, including genomic sequence data and information contained within electronic medical records. This support included sharing data with researchers from universities and healthcare institutions, both in Singapore and overseas. Support was conditional on the perceived social value of the research and appropriate de-identification and data security processes. Participants suggested that a data sharing oversight body would help strengthen public trust and comfort in data research for PM in Singapore.Conclusion Maintenance of public trust in data security systems and governance regimes can enhance participation in PM and data sharing for research. Contrary to themes in much prior research, participants demonstrated a sophisticated understanding of the inherent risks of data sharing, analysed trade-offs between risks and potential benefits of PM, and often adopted an international perspective.


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Ankush Balaram Pawar ◽  
Dr. Shashikant U. Ghumbre ◽  
Dr. Rashmi M. Jogdand

Purpose Cloud computing plays a significant role in the initialization of secure communication between users. The advanced technology directs to offer several services, such as platform, resources, and accessing the network. Furthermore, cloud computing is a broader technology of communication convergence. In cloud computing architecture, data security and authentication are the main significant concerns. Design/methodology/approach The purpose of this study is to design and develop authentication and data security model in cloud computing. This method includes six various units, such as cloud server, data owner, cloud user, inspection authority, attribute authority, and central certified authority. The developed privacy preservation method includes several stages, namely setup phase, key generation phase, authentication phase and data sharing phase. Initially, the setup phase is performed through the owner, where the input is security attributes, whereas the system master key and the public parameter are produced in the key generation stage. After that, the authentication process is performed to identify the security controls of the information system. Finally, the data is decrypted in the data sharing phase for sharing data and for achieving data privacy for confidential data. Additionally, dynamic splicing is utilized, and the security functions, such as hashing, Elliptic Curve Cryptography (ECC), Data Encryption Standard-3 (3DES), interpolation, polynomial kernel, and XOR are employed for providing security to sensitive data. Findings The effectiveness of the developed privacy preservation method is estimated based on other approaches and displayed efficient outcomes with better privacy factor and detection rate of 0.83 and 0.65, and time is highly reduced by 2815ms using the Cleveland dataset. Originality/value This paper presents the privacy preservation technique for initiating authenticated encrypted access in clouds, which is designed for mutual authentication of requester and data owner in the system.


Author(s):  
Shaveta Malik ◽  
Archana Mire ◽  
Amit Kumar Tyagi ◽  
Arathi Boyanapalli

Clinical research comprises participation from patients. Often there are concerns of enrolment from patients. Hence, it has to face various challenges related to personal data, such as data sharing, privacy and reproducibility, etc. Patients and researchers need to track a set plan called study protocol. This protocol spans through various stages such as registration, collection and analysis of data, report generation, and finally, results in publication of findings. The Blockchain technology has emerged as one of the possible solutions to these challenges. It has a potential to address all the problem associated with clinical research. It provides the comfort for building transparent, secure services relying on trusted third party. This technology enables one to share the control of the data, security, and the parameters with a single patient or a group of patients or any other stakeholders of clinical trial. This chapter addresses the use of blockchain in execution of secure and trusted clinical trials.


Sign in / Sign up

Export Citation Format

Share Document