scholarly journals Analysis of sensitive information leakage in functional genomics signal profiles through genomic deletions

2018 ◽  
Vol 9 (1) ◽  
Author(s):  
Arif Harmanci ◽  
Mark Gerstein
2018 ◽  
Vol 7 (3) ◽  
pp. 393-399
Author(s):  
Prajna Deshanta Ibnugraha ◽  
Lukito Edi Nugroho ◽  
Paulus Insap Santosa

Involvement of digital information in almost of enterprise sectors makes information having value that must be protected from information leakage. In order to obtain proper method for protecting sensitive information, enterprise must perform risk analysis of threat. However, enterprises often get limitation in measuring risk related information security threat. Therefore, this paper has goal to give approach for estimating risk by using information value. Techniques for measuring information value in this paper are text mining and Jaccard method. Text mining is used to recognize information pattern based on three classes namely high business impact, medium business impact and low business impact. Furthermore, information is given weight by Jaccard method. The weight represents risk levelof information leakage in enterprise quantitatively. Result of comparative analysis with existing method show that proposed method results more detailed output in estimating risk of information security threat.


Cell ◽  
2020 ◽  
Vol 183 (4) ◽  
pp. 905-917.e16
Author(s):  
Gamze Gürsoy ◽  
Prashant Emani ◽  
Charlotte M. Brannon ◽  
Otto A. Jolanki ◽  
Arif Harmanci ◽  
...  

Kybernetes ◽  
2015 ◽  
Vol 44 (1) ◽  
pp. 77-88 ◽  
Author(s):  
Sung-Hwan Kim ◽  
Nam-Uk Kim ◽  
Tai-Myoung Chung

Purpose – The purpose of this paper is to provide a model for quantitatively analyzing the security profile of an organization’s IT environment. The model considers the security risks associated with stored data, as well as services and devices that can act as channels for data leakages. The authors propose a sensitive information (SI) leakage vulnerability model. Design/methodology/approach – Factors identified as having an impact on the security profile are identified, and scores are assigned based on detailed criteria. These scores are utilized by mathematical models that produce a vulnerability index, which indicates the overall security vulnerability of the organization. In this chapter, the authors verify the model result extracted from SI leakage vulnerability weak index by applying the proposed model to an actual incident that occurred in South Korea in January 2014. Findings – The paper provides vulnerability result and vulnerability index. They are depends on SI state in information systems. Originality/value – The authors identify and define four core variables related to SI leakage: SI, security policy, and leakage channel and value of SI. The authors simplify the SI leakage problem. The authors propose a SI leakage vulnerability model.


In this modern era, all organizations depend on internet and data so, maintaining of all data is done by the third party in large organizations. But in this present on-developing world, one have to share the data inside or outside the organization which incorporates the sensitive data of the venture moreover. Data of the organization have sensitive data which should not share with any others but unfortunately, that data was there in the third party hands so; we need to protect the data and also have to identify the guilt agent. For this, we propose a model that would evaluate and correctly identifies guilt agents, for which a recursive partitioning has been created which is a decision tree that spills data in to the sub partitions and does the easiest way to get alert and at least one specialist or it can autonomously accumulate by some different means. The main intention of the model is to secure sensitive information by recognizing the leakage and distinguish the guilt agent.


Author(s):  
Manish Ranjan ◽  
Ayub Hussain Mondal ◽  
Monjul Saikia

<p>Cloud based service provider are at its top of its services for various applications, as their services are very much reachable from anywhere anytime in current days. It is responsibility of the company that the Cloud storage is owned and maintained by themselves keeping the data available and accessible, and the physical environment protected and running. Could storage provider seem to be uncertain of confidentiality in many cases, as we need to limit ourselves on trust to a third party. Keeping our sensitive data ready to access any time anywhere with preventing any information leakage is a challenging task. Cryptography in this scenario plays an important role, providing security for information to protect valuable information resources on intranets, Internet and the cloud. In addition, Homomorphic cryptosystem is a form of Cryptography where some specific computation can be performed over the cipher text producing a resultant cipher text which, when decrypted, equals the result of operations carry out on the plaintext. With help of this unique property of homomorphism cryptography we proposed a system to keep sensitive information in encrypted form in the cloud storage/service provider and used those data as whenever we require. The scheme proposed here is designed for a secure online voting system on Android platform and voted information is encrypted and stored those in the cloud.</p>


2020 ◽  
Author(s):  
Zhengfei Wang ◽  
Lai Wang ◽  
Fu'an Xiao Xiao ◽  
Qingsong Chen ◽  
Liming Lu ◽  
...  

UNSTRUCTURED Recently, the problem of Traditional Chinese medicine (TCM) safety has attracted the whole society’s attention. In order to prevent fake drugs from spread, it is necessary to establish drug traceability system. The traditional drug traceability system can record the whole circulation process of drugs from planting, production, processing and warehousing from hospitals to patients. Once fake drugs are found, they can be traced back to the source. However, there are some drawbacks in the traditional drug traceability system, such as failing to prevent tampering and causing sensitive disclosure easily. Although blockchain (including Bitcoin and Ethernet Square) is an effective technology to solve traditional drug traceability system’s problems. However, some risks makes it less reliable for blockchain such as information explosion, sensitive information leakage and poor scalability. To avoid these application risks, we propose a kind of lightweight block chain framework.This framework performed both horizontal and vertical segmentations in designing the blocks, and provided effective strategies for both segmentions, respectively. For horizontal segmentation operations, the header and body of the blockchain are separated and stored in the blockchain, and the body is stored in the IPFS (Inter Planetary File System). For vertical segmentation operations, block chain is cut off according to time or size. For new blocks’ addition, miners only need to copy the latest part of the blockchain and append the tail and vertical segmentation of the block through the consensus mechanism. Our proposed framework could greatly reduce the size of the blockchain, and improve the verification efficiency. Experimental results show that the efficiency improves when a new block is added to the blockchain and conducting search compared with Ethernet.


Sign in / Sign up

Export Citation Format

Share Document