scholarly journals Design of Safety and Integrated Disaster Prevention System Based on Big Data Technology

2022 ◽  
Vol 2146 (1) ◽  
pp. 012036
Author(s):  
Yungui Chen ◽  
Liwei Tian ◽  
Lei Yang ◽  
Longqing Zhang

Abstract With the development of Internet technology, with the continuous increase of data volume, it has become more and more difficult to maintain the traditional centralized data storage method. Data is easy to copy, difficult to share, high storage costs, and low data usage efficiency. Further trigger the demand for more efficient data storage technology. This article aims to study the application of blockchain technology in the data security storage and sharing system. On the basis of analyzing the problems of data sharing and cryptography, the functional modules of the data security storage and sharing system are designed. Encryption uses public key encryption algorithm to ensure encryption performance. The simulation experiment results show that the system is effective for file sharing, and the average generation time of the algorithm in this paper is within the controllable range.

In the cryptocurrency era, Blockchain is one of the expeditiously growing information technologies that help in providing security to the data. Data tampering and authentication problems generally occur in centralized servers while sharing and storing the data. Blockchain provides the platform for big data and cloud storage in enhancing the security by evading from pernicious users. In this paper, we have discussed the exhaustive description of blockchain and its need, features and applications. Analysis of blockchain is done for different domains such as big data, cloud, internet of things and mobile cloud where the differences V’s are compared with big data and blockchain. SWOT (Strength Weakness Opportunities Threats) analysis is performed to address the merits and limitations in blockchain technology. The survey in aspects of data security, data storage, data sharing and data authentication through blockchain technology is done and the challenges are discussed to overcome the problem that leads in big data and cloud storage. The detailed comparative analysis proves that the blockchain technology overcomes the problems in big data storage and data security in cloud.


Data security is the key to the development of modern internet technology. By allowing digital information to be distributed but not copied, blockchain technology created the backbone of a new type of internet. It allows storage of all transactions into immutable records and every record distributed across many participant’s nodes. As there is huge increase in the use cases for blockchain technology, nowadays, the primary issue is to enable secure data sharing, data integrity and authentication. The goal of this study paper is to provide a systematic literature survey exploring the use of blockchain as a base technology for securing financial as well as non-financial applications. The purpose is to identify the whether blockchain technology is capable to provide the desired security solutions in various application. The advantages, challenges and the solution provided by previous research is discussed. The survey was focused on various security issues like Confidentiality, Integrity, Availability, Authenticity, Accountability, and Reliability. The study shows that the Blockchain technology is prospective for financial and non-financial services since it can provide solutions for majority of security issues. Future research needs to provide the implementations of desired solutions discussed in security challenges of Blockchain technology


2021 ◽  
Vol 2021 ◽  
pp. 1-11
Author(s):  
Daoqi Han ◽  
Songqi Wu ◽  
Zhuoer Hu ◽  
Hui Gao ◽  
Enjie Liu ◽  
...  

The edge computing node plays an important role in the evolution of the artificial intelligence-empowered Internet of things (AIoTs) that converge sensing, communication, and computing to enhance wireless ubiquitous connectivity, data acquisition, and analysis capabilities. With full connectivity, the issue of data security in the new cloud-edge-terminal network hierarchy of AIoTs comes to the fore, for which blockchain technology is considered as a potential solution. Nevertheless, existing schemes cannot be applied to the resource-constrained and heterogeneous IoTs. In this paper, we consider the blockchain design for the AIoTs and propose a novel classified ledger framework based on lightweight blockchain (CLF-LB) that separates and stores data rights at the source and enables a thorough data flow protection in the open and heterogeneous network environment of AIoT. In particular, CLF-LB divides the network into five functional layers for optimal adaptation to AIoTs applications, wherein an intelligent collaboration mechanism is also proposed to enhance the across-layer operation. Unlike traditional full-function blockchain models, our framework includes novel technical modules, such as block regenesis, iterative reinforcement of proof-of-work, and efficient chain uploading via the system-on-chip system, which are carefully designed to fit the cloud-edge-terminal hierarchy in AIoTs networks. Comprehensive experimental results are provided to validate the advantages of the proposed CLF-LB, showing its potentials to address the secrecy issues of data storage and sharing in AIoTs networks.


2021 ◽  
Vol 5 (3) ◽  
pp. 446-455
Author(s):  
Annisya ◽  
Emy Haryatmi

In recent times, the supply chain has developed into a large ecosystem. Various products moving from party to party require cooperation between stakeholders in managing the data generated. The problem is that every company has its own transaction records that can be inconsistent and their storage is centralized and not integrated between companies. This makes transaction records easy to falsify. Efficient data management is needed from the producer to the store so that consumers can trust the product. Therefore, the authors designed a product tracking system using blockchain by implementing proof of work (PoW) as the consensus algorithm, SHA-3 256 as data security, Mongo database as cloud-based data storage and QR Code as the output. As a result, transaction data from producers, distributors to retail stores are stored completely in MongoDB which is a cloud-based database, then the resulting QR Code can be used to view details of producers, distributors to retail stores that sell them. The simulation and trial results show the product tracing system design is successful as expected.  


2020 ◽  
Vol 20 (1) ◽  
Author(s):  
Maliha Sultana ◽  
Afrida Hossain ◽  
Fabiha Laila ◽  
Kazi Abu Taher ◽  
Muhammad Nazrul Islam

Abstract Background Data security has been a critical topic of research and discussion since the onset of data sharing in e-health systems. Although digitalization of data has increased efficiency and speed, it has also made data vulnerable to cyber attacks. Medical records in particular seem to be the regular victims of hackers. Several data breach incidents throughout history have warranted the invention of security measures against these threats. Although various security procedures like firewalls, virtual private networks, encryption, etc are present, a mix of these approaches are required for maximum security in medical image and data sharing. Methods Relatively new, blockchain has become an effective tool for safeguarding sensitive information. However, to ensure overall protection of medical data (images), security measures have to be taken at each step, from the beginning, during and even after transmission of medical images which is ensured by zero trust security model. In this research, a number of studies that deal with these two concepts were studied and a decentralized and trustless framework was proposed by combining these two concepts for secured medical data and image transfer and storage. Results Research output suggested blockchain technology ensures data integrity by maintaining an audit trail of every transaction while zero trust principles make sure the medical data is encrypted and only authenticated users and devices interact with the network. Thus the proposed model solves a lot of vulnerabilities related to data security. Conclusions A system to combat medical/health data vulnerabilities has been proposed. The system makes use of the immutability of blockchain, the additional security of zero trust principles, and the scalability of off chain data storage using Inter Planetary File Systems (IPFS). The adoption of this system suggests to enhance the security of medical or health data transmission.


Energies ◽  
2021 ◽  
Vol 14 (7) ◽  
pp. 1873
Author(s):  
Robert Karaszewski ◽  
Paweł Modrzyński ◽  
Joanna Modrzyńska

Blockchain technology is currently one of the trends considered to have a tremendous future ahead. It ensures data security, data sharing protection and automation development—elements that are of colossal importance in the era of cloud solutions, big data and Internet of Things (IoT) reality. Additionally, blockchain technology allows one to create new programmable ecosystems on an unprecedented scale. The implementation of blockchain technology leads not only to improving the flow of documents and data storage, as is the case with the creation of shared service centers (SSCs), but—as this paper shows—allows one to reduce the carbon footprint when servicing SSCs at a considerably higher organizational level at the same time. The example of an SSC in Elbląg, Poland, proves that cloud solutions enabling electronic documents flow and data storage combined with blockchain technology are tools essential for further SSCs development. Furthermore, such tools allow us not only to obtain economic effects (i.e., cost reduction), but also to achieve positive ecological effects (i.e., carbon footprint reduction).


Author(s):  
Namrata Thakur ◽  
Dr. Vinayak D Shinde

Data security is the key to the development of modern Internet technology. The distributed, decentralized, and secured hashed mechanism of the blockchain gives a complete new point of view for the evolution of data security technology. Block chain technology is one of the major technological innovations of this century. In the last couple of years, the interest around blockchain technologies is increasing. Many implementation of blockchain technology are widely available today. Blockchain,the foundation of Bitcoin, has gain much attention in this era. Blockchain is an encrypted, immutable, distributed ledger, which allows transactions take place in a decentralized manner. Blockchain based applications expected to alter numerous fields including financial services, health care, entertainment media, Internet of Things (IoT), and many more. The Blockchain technology plays important role in the process of data security. In this paper, we will discuss about the research being done on this new domain of Computer Science. It is not only the most popular topic to discuss about, but is the most technological innovation, that is all set to reform the entire world.


2021 ◽  
Vol 2021 ◽  
pp. 1-14
Author(s):  
Siriboon Chaisawat ◽  
Chalee Vorakulpipat

The growing number of e-voting applications indicates the need in resolving issues that exist in the traditional election model. By integrating with blockchain technology, we could extend the model’s capabilities by presenting transparency in logic execution and integrity in data storage. Despite these advantages, blockchain brings in new challenges regarding system performance and data privacy. Due to distributed nature of blockchain, any new updating request needs to be reflected in all network’s peers before proceeding to the subsequence requests. This process produces delay and possibility in request rejection due to update conflict. In addition, data removal is no longer feasible since each record is protected by immutable hashed link. To overcome these limitations, the integration model of blockchain and message queue is proposed in this paper. The design addresses security concerns in data exchanging patterns, voter anonymization, and proof of system actor’s legitimacy. Performance tests are conducted on system prototypes which were deployed on two different settings. The result shows that the system can perform well in production environment, and introduction of message queue handling scheme can cope with blockchain’s errors in unexpected scenarios.


2019 ◽  
pp. 65-72
Author(s):  
E. V. Timoschenko ◽  
A. F. Razhkov

An effective method for solving data security problems is proposed. A new approach to the design of steganographic system based on the three basic methods - the introduction of parts of a shared secret into images with the possibility of further extraction of secret information, authentication of parts of a secret, self-healing of this security system. Such a system provides a greater degree of protection and secure data storage. The Windows application implements the proposed steganographic model, has no analogues and meets all the requirements set for steganographic software.


Author(s):  
D. V. Gribanov

Introduction. This article is devoted to legal regulation of digital assets turnover, utilization possibilities of distributed computing and distributed data storage systems in activities of public authorities and entities of public control. The author notes that some national and foreign scientists who study a “blockchain” technology (distributed computing and distributed data storage systems) emphasize its usefulness in different activities. Data validation procedure of digital transactions, legal regulation of creation, issuance and turnover of digital assets need further attention.Materials and methods. The research is based on common scientific (analysis, analogy, comparing) and particular methods of cognition of legal phenomena and processes (a method of interpretation of legal rules, a technical legal method, a formal legal method and a formal logical one).Results of the study. The author conducted an analysis which resulted in finding some advantages of the use of the “blockchain” technology in the sphere of public control which are as follows: a particular validation system; data that once were entered in the system of distributed data storage cannot be erased or forged; absolute transparency of succession of actions while exercising governing powers; automatic repeat of recurring actions. The need of fivefold validation of exercising governing powers is substantiated. The author stresses that the fivefold validation shall ensure complex control over exercising of powers by the civil society, the entities of public control and the Russian Federation as a federal state holding sovereignty over its territory. The author has also conducted a brief analysis of judicial decisions concerning digital transactions.Discussion and conclusion. The use of the distributed data storage system makes it easier to exercise control due to the decrease of risks of forge, replacement or termination of data. The author suggests defining digital transaction not only as some actions with digital assets, but also as actions toward modification and addition of information about legal facts with a purpose of its establishment in the systems of distributed data storage. The author suggests using the systems of distributed data storage for independent validation of information about activities of the bodies of state authority. In the author’s opinion, application of the “blockchain” technology may result not only in the increase of efficiency of public control, but also in the creation of a new form of public control – automatic control. It is concluded there is no legislation basis for regulation of legal relations concerning distributed data storage today.


Sign in / Sign up

Export Citation Format

Share Document