scholarly journals Data Circulation Blockchain Model Construction and Data Access Management

2019 ◽  
Vol 1345 ◽  
pp. 022048
Author(s):  
Yang Liu ◽  
Jincheng Huang
2019 ◽  
Vol 7 (4) ◽  
pp. 225
Author(s):  
Made Dimas Dwi Sutanegara ◽  
Cokorda Rai Adi Pramartha

PT. Telkom Indonesia is a State-Owned Enterprise (BUMN) that provides the largest telecommunications and network services in Indonesia. Data Access Management (DAMAN) is one of the divisions whose task is to update SISKA data, purify network data, and generate Iranian Optical Distribution Purpose (ODP). ODP functions as a protection or place for fiber optic cables at each Telkom pole. ODP can be viewed through the starclik website, for ODP that is not visible on the platform it could be because full ODP or ODP data is not correct on the server, due to the possibility that the field staff did not report the latest data to the division. So that it requires an ODP reporting reminder system to reduce errors that do not arise from ODP.


2019 ◽  
Author(s):  
Xiaochen Zheng ◽  
Shengjing Sun ◽  
Raghava Rao Mukkamala ◽  
Ravi Vatrapu ◽  
Joaquín Ordieres-Meré

BACKGROUND Huge amounts of health-related data are generated every moment with the rapid development of Internet of Things (IoT) and wearable technologies. These big health data contain great value and can bring benefit to all stakeholders in the health care ecosystem. Currently, most of these data are siloed and fragmented in different health care systems or public and private databases. It prevents the fulfillment of intelligent health care inspired by these big data. Security and privacy concerns and the lack of ensured authenticity trails of data bring even more obstacles to health data sharing. With a decentralized and consensus-driven nature, distributed ledger technologies (DLTs) provide reliable solutions such as blockchain, Ethereum, and IOTA Tangle to facilitate the health care data sharing. OBJECTIVE This study aimed to develop a health-related data sharing system by integrating IoT and DLT to enable secure, fee-less, tamper-resistant, highly-scalable, and granularly-controllable health data exchange, as well as build a prototype and conduct experiments to verify the feasibility of the proposed solution. METHODS The health-related data are generated by 2 types of IoT devices: wearable devices and stationary air quality sensors. The data sharing mechanism is enabled by IOTA’s distributed ledger, the Tangle, which is a directed acyclic graph. Masked Authenticated Messaging (MAM) is adopted to facilitate data communications among different parties. Merkle Hash Tree is used for data encryption and verification. RESULTS A prototype system was built according to the proposed solution. It uses a smartwatch and multiple air sensors as the sensing layer; a smartphone and a single-board computer (Raspberry Pi) as the gateway; and a local server for data publishing. The prototype was applied to the remote diagnosis of tremor disease. The results proved that the solution could enable costless data integrity and flexible access management during data sharing. CONCLUSIONS DLT integrated with IoT technologies could greatly improve the health-related data sharing. The proposed solution based on IOTA Tangle and MAM could overcome many challenges faced by other traditional blockchain-based solutions in terms of cost, efficiency, scalability, and flexibility in data access management. This study also showed the possibility of fully decentralized health data sharing by replacing the local server with edge computing devices.


Electronics ◽  
2021 ◽  
Vol 10 (9) ◽  
pp. 1000
Author(s):  
Yong Zhu ◽  
Chao Huang ◽  
Zhihui Hu ◽  
Abdullah Al-Dhelaan ◽  
Mohammed Al-Dhelaan

In the post-cloud era, edge computing is a new computing paradigm with data processed at the edge of the network, which can process the data close to the end-user in real time and offload the cloud task intelligently. Meanwhile, the decentralization, tamper-proof and anonymity of blockchain technology can provide a new trusted computing environment for edge computing. However, it does raise considerable concerns of security, privacy, fault-tolerance and so on. For example, identity authentication and access control rely on third parties, heterogeneous devices and different vendors in IoT, leading to security and privacy risks, etc. How to combine the advantages of the two has become the highlight of academic research, especially the issue of secure resource management. Comprehensive security and privacy involve all aspects of platform, data, application and access control. In. this paper, the architecture and behavior of an Access Management System (AMS) in a proof of concept (PoC) prototype are proposed with a Color Petri Net (CPN) model. The two domains of blockchain and edge computing are organically connected by interfaces and interactions. The simulation of operation, activity and role association proves the feasibility and effectiveness of the AMS. The instances of platform business access control, data access control, database services, IOT hub service are run on Advantech WISE-PaaS through User Account and Authentication (UAA). Finally, fine-grained and distributed access control can be realized with the help of a blockchain attribute. Namely, smart contracts are used to register, broadcast, and revoke access authorization, as well as to create specific transactions to define access control policies.


2020 ◽  
Vol 2 (1-2) ◽  
pp. 66-77 ◽  
Author(s):  
Christopher Brewster ◽  
Barry Nouwt ◽  
Stephan Raaijmakers ◽  
Jack Verhoosel

This paper focuses on fine-grained, secure access to FAIR data, for which we propose ontology-based data access policies. These policies take into account both the FAIR aspects of the data relevant to access (such as provenance and licence), expressed as metadata, and additional metadata describing users. With this tripartite approach (data, associated metadata expressing FAIR information, and additional metadata about users), secure and controlled access to object data can be obtained. This yields a security dimension to the “A” (accessible) in FAIR, which is clearly needed in domains like security and intelligence. These domains need data to be shared under tight controls, with widely varying individual access rights. In this paper, we propose an approach called Ontology-Based Access Control (OBAC), which utilizes concepts and relations from a data set's domain ontology. We argue that ontology-based access policies contribute to data reusability and can be reconciled with privacy-aware data access policies. We illustrate our OBAC approach through a proof-of-concept and propose that OBAC to be adopted as a best practice for access management of FAIR data.


Author(s):  
Arulananth T S ◽  
Baskar M ◽  
Anbarasu V ◽  
Thiyagarajan R ◽  
Rajendran T ◽  
...  

Author(s):  
Yaser Mansouri ◽  
Rajkumar Buyya

Multi-cloud storage offers better Quality of Service (QoS) such as availability, durability, and users' perceived latency. The exploitation of price differences across cloud-based storage services is a motivate example of storing data in different Geo-graphically data stores, where data migration is also a choice to achieve more cost optimization. However, this requires migrating data in tolerable time from the perspective of users. This chapter first proposes a comprehensive review on different classes of data stores inspiring data migration within and across data stores. Then, it presents the design of a system prototype spanned across storage services of Amazon Web Services (AWS) and Microsoft Azure employing their RESTful APIs to store, retrieve, delete, and migrate data. Finally, the experimental results show that the data migration can be conducted in a few seconds for data with a magnitude of Megabytes.


Sign in / Sign up

Export Citation Format

Share Document