Secure and Consistent Job Administration Using Encrypted Data Access Policies in Cloud Systems

2021 ◽  
Vol 96 ◽  
pp. 107520
Author(s):  
Gayathri Nagasubramanian ◽  
Rakesh kumar Sakthivel ◽  
Fadi Al-Turjman
2021 ◽  
Vol 1 (2) ◽  
pp. 89
Author(s):  
Lutfia Rizkyatul Akbar ◽  
Gunadi Gunadi

This study aims to assess the implementation of the openness of banking data access policies to improving tax compliance in Indonesia. It cause by the implementation of tax collection using a self-assessment system, thus requiring taxpayer data and information through financial institutions, include banking. Researchers used qualitative descriptive methods. The results of this study are, first, there is support for the implementation of the policy on openness to access to banking data in increasing tax compliance in Indonesia in the form of the issuance of Law Number 9 of 2017 concerning Access to Financial Information. Second, the implementation of banking data disclosure policies to increase tax compliance in Indonesia, including the willingness of target groups to comply with policy outputs, in this case the reporting of customer data by banks to the DGT. Third, the policy of open banking data access does not impede or reduce the number of bank accounts and deposits. Fourth, there are technical obstacles both by the DGT and the banking sector, especially in the first year. Furthermore, there are several inhibiting factors in the implementation of this policy, namely IT factors, and resistance from some circles at the beginning of the emergence of regulations, limited financial resources to process data quickly, so it must be done gradually, in addition to lack of quantity and quality of human resources 


Author(s):  
Jack Teng ◽  
Kim McGrail

IntroductionIn British Columbia, the rules and procedures that data stewards follow to adjudicate data access requests (DAR) vary considerably. These variations can lead to discrepancies in the speed at which DARs are processed. With complex DARs involving numerous data stewards and data sets, the request may take over a year Objectives and ApproachOur main goal was to understand the institutional and cultural factors that influence data stewards when processing a DAR. We wished to see in particular if risk aversion was playing a role when making decisions about data access. We interviewed 24 people representing 21 organizations in British Columbia. Most were data stewards, but we also interviewed people processing the data requests and also privacy advisors. ResultsWe found that organizations varied greatly in terms of their skills and expertise regarding the rules and procedures around processing DARs. In particular, data stewards noted that they experienced differences in interpreting legislation, resulting in disagreements when they were working with other data stewards. In terms of risk aversion, data stewards stated they wished to encourage research, but in some cases followed unclear rules. Nearly all noted that there is little guidance provided for the job of “data steward” and either no or very little training when taking on these positions. Conclusion/ImplicationsWhile there may be stated governmental policies promoting that linked data be used for research, ultimately it is the data stewards approving DARs that will determine access to data. Understanding how and why they make those decisions will help better implement data access policies.


2021 ◽  
Vol 4 ◽  
Author(s):  
Aakash Sharma ◽  
Thomas Bye Nilsen ◽  
Katja Pauline Czerwinska ◽  
Daria Onitiu ◽  
Lars Brenna ◽  
...  

Researchers and researched populations are actively involved in participatory epidemiology. Such studies collect many details about an individual. Recent developments in statistical inferences can lead to sensitive information leaks from seemingly insensitive data about individuals. Typical safeguarding mechanisms are vetted by ethics committees; however, the attack models are constantly evolving. Newly discovered threats, change in applicable laws or an individual's perception can raise concerns that affect the study. Addressing these concerns is imperative to maintain trust with the researched population. We are implementing Lohpi: an infrastructure for building accountability in data processing for participatory epidemiology. We address the challenge of data-ownership by allowing institutions to host data on their managed servers while being part of Lohpi. We update data access policies using gossips. We present Lohpi as a novel architecture for research data processing and evaluate the dissemination, overhead, and fault-tolerance.


2020 ◽  
Vol 23 (1) ◽  
Author(s):  
Eder Ávila-Barrientos

El objetivo de este trabajo consiste en analizar los principios teórico-metodológicos relacionados con la descripción de los datos de investigación. Se realizó un análisis sobre el estado de la cuestión de los datos de investigación, en cual se abordan aspectos de su citación, descripción y sistematización. Se identificaron y analizaron los elementos de metadatos para la descripción de conjuntos de datos de investigación que se incluyen en el DataCite Metadata Schema, con el propósito de crear una propuesta de perfil descriptivo aplicable a estos conjuntos. Se estima que, si los datos de investigación se encuentran debidamente descritos, entonces se fomentará en mayor grado su accesibilidad y reutilización. Para ello, es necesario que las instituciones académicas y de investigación participen en la generación de políticas de acceso abierto a sus datos de investigación. The objective of this work is to analyze the theoretical-methodological principles related to the description and accessibility of research data. Hermeneutics and discourse analysis were applied to literature specialized in: research data; access and description of research data; data repositories. Metadata elements for the description of research datasets that are included in the DataCite Metadata Schema were identified and analyzed, in order to create a descriptive profile proposal for research data sets, which can be applied in the data repositories. If the research data is properly described, then its accessibility and reuse will be further promoted. To do this, it is necessary for academic and research institutions to participate in the generation of open access policies for their research data.


2021 ◽  
Vol 13 (11) ◽  
pp. 279
Author(s):  
Siti Dhalila Mohd Satar ◽  
Masnida Hussin ◽  
Zurina Mohd Hanapi ◽  
Mohamad Afendee Mohamed

Managing and controlling access to the tremendous data in Cloud storage is very challenging. Due to various entities engaged in the Cloud environment, there is a high possibility of data tampering. Cloud encryption is being employed to control data access while securing Cloud data. The encrypted data are sent to Cloud storage with an access policy defined by the data owner. Only authorized users can decrypt the encrypted data. However, the access policy of the encrypted data is in readable form, which results in privacy leakage. To address this issue, we proposed a reinforcement hiding in access policy over Cloud storage by enhancing the Ciphertext Policy Attribute-based Encryption (CP-ABE) algorithm. Besides the encryption process, the reinforced CP-ABE used logical connective operations to hide the attribute value of data in the access policy. These attributes were converted into scrambled data along with a ciphertext form that provides a better unreadability feature. It means that a two-level concealed tactic is employed to secure data from any unauthorized access during a data transaction. Experimental results revealed that our reinforced CP-ABE had a low computational overhead and consumed low storage costs. Furthermore, a case study on security analysis shows that our approach is secure against a passive attack such as traffic analysis.


2019 ◽  
Author(s):  
Ray Hales Hylock ◽  
Xiaoming Zeng

BACKGROUND Blockchain has the potential to disrupt the current modes of patient data access, accumulation, contribution, exchange, and control. Using interoperability standards, smart contracts, and cryptographic identities, patients can securely exchange data with providers and regulate access. The resulting comprehensive, longitudinal medical records can significantly improve the cost and quality of patient care for individuals and populations alike. OBJECTIVE This work presents HealthChain, a novel patient-centered blockchain framework. The intent is to bolster patient engagement, data curation, and regulated dissemination of accumulated information in a secure, interoperable environment. A mixed-block blockchain is proposed to support immutable logging and redactable patient blocks. Patient data are generated and exchanged through Health Level-7 Fast Healthcare Interoperability Resources, allowing seamless transfer with compliant systems. In addition, patients receive cryptographic identities in the form of public and private key pairs. Public keys are stored in the blockchain and are suitable for securing and verifying transactions. Furthermore, the envisaged system uses proxy re-encryption (PRE) to share information through revocable, smart contracts, ensuring the preservation of privacy and confidentiality. Finally, several PRE improvements are offered to enhance performance and security. METHODS The framework was formulated to address key barriers to blockchain adoption in health care, namely, information security, interoperability, data integrity, identity validation, and scalability. It supports 16 configurations through the manipulation of 4 modes. An open-source, proof-of-concept tool was developed to evaluate the performance of the novel patient block components and system configurations. To demonstrate the utility of the proposed framework and evaluate resource consumption, extensive testing was performed on each of the 16 configurations over a variety of scenarios involving a variable number of existing and imported records. RESULTS The results indicate several clear high-performing, low-bandwidth configurations, although they are not the strongest cryptographically. Of the strongest models, one’s anticipated cumulative record size is shown to influence the selection. Although the most efficient algorithm is ultimately user specific, Advanced Encryption Standard–encrypted data with static keys, incremental server storage, and no additional server-side encryption are the fastest and least bandwidth intensive, whereas proxy re-encrypted data with dynamic keys, incremental server storage, and additional server-side encryption are the best performing of the strongest configurations. CONCLUSIONS Blockchain is a potent and viable technology for patient-centered access to and exchange of health information. By integrating a structured, interoperable design with patient-accumulated and generated data shared through smart contracts into a universally accessible blockchain, HealthChain presents patients and providers with access to consistent and comprehensive medical records. Challenges addressed include data security, interoperability, block storage, and patient-administered data access, with several configurations emerging for further consideration regarding speed and security.


2018 ◽  
Vol 7 (2.7) ◽  
pp. 20 ◽  
Author(s):  
Rakesh Shirsath ◽  
Dr K. V. Daya Sagar

Nowadays cloud computing is most demanding technology where computing resources are availed as per demand through Internet. Cloud computing model also brings many challenges for confidentiality, integrity, privacy of data and data access control. As cloud computing develops vigorously, an increasing number of enterprises and individuals are motivated to upload their data sources to the public cloud server for sharing. It is not entirely credible for enterprises and individuals to transfer data owing to the openness of the cloud server, so they must encrypt data before uploading and also loose direct control of data. Therefore, an elastic access control or fine-grained access control approach for data is urgently required and becomes a challenging open problem. In this paper, the issue of access control is discussed by defining traditional access policies. Attribute based access policy is analysed with its types. Finally, comparison is made among all policies with respect to various parameters.


Sign in / Sign up

Export Citation Format

Share Document