A Methodology of Trusted Data Sharing across Telecom and Finance Sector under China’s Data Security Policy

Author(s):  
Yuxin Liang ◽  
Zhiyong Liu ◽  
Yong Song ◽  
Aidong Yang ◽  
Xiaozhou Ye ◽  
...  
2019 ◽  
Vol 13 (4) ◽  
pp. 356-363
Author(s):  
Yuezhong Wu ◽  
Wei Chen ◽  
Shuhong Chen ◽  
Guojun Wang ◽  
Changyun Li

Background: Cloud storage is generally used to provide on-demand services with sufficient scalability in an efficient network environment, and various encryption algorithms are typically applied to protect the data in the cloud. However, it is non-trivial to obtain the original data after encryption and efficient methods are needed to access the original data. Methods: In this paper, we propose a new user-controlled and efficient encrypted data sharing model in cloud storage. It preprocesses user data to ensure the confidentiality and integrity based on triple encryption scheme of CP-ABE ciphertext access control mechanism and integrity verification. Moreover, it adopts secondary screening program to achieve efficient ciphertext retrieval by using distributed Lucene technology and fine-grained decision tree. In this way, when a trustworthy third party is introduced, the security and reliability of data sharing can be guaranteed. To provide data security and efficient retrieval, we also combine active user with active system. Results: Experimental results show that the proposed model can ensure data security in cloud storage services platform as well as enhance the operational performance of data sharing. Conclusion: The proposed security sharing mechanism works well in an actual cloud storage environment.


Author(s):  
Chandrakala B M ◽  
S C Lingareddy

<p>In recent days, data sharing has provided the flexibility to share the data, store the data, and perform operation on data virtually as well as cost effectively. Data sharing in cloud is one of the feature, which is being popular and widely accepted. However, the concern here is to ensure the data security and this has led the researcher to research in this area. To provide the security several Proxy re-encryption scheme has been introduced, however all these method lacks of efficiency. Hence In this paper, we propose a scheme known as ALBC (Adaptive Lattice Based Cryptography), this scheme follows the two phase i.e. encryption and Re-encryption. Encryption phase has few algorithms such as Key_Gen, Enc, Dec. Similarly ALBC Re-Enc has five algorithm i.e. Key_Gen, Key_ReGen,  Enc, Re-Enc, Dec. our algorithm not only provides the security but also solves the problem of RL(Ring-learning) with errors problems. In order to evaluate, our algorithm is compared with the existing model in terms of encryption time, decryption time, re-encryption time, key generation  and key regeneration by varying the various key size. When we observe the comparative analysis, it is observed that our algorithm outperforms the existing algorithm.</p>


2011 ◽  
Vol 187 ◽  
pp. 358-361
Author(s):  
Hua Jiang ◽  
Jing Wen

As the low maintenance cost of data trusteeship, more and more medium-size and small size enterprises choose data trusteeship service. Data is valuable fortune of enterprise, security of enterprise data must be guaranteed in the condition of together using a same host. Data security includes data transmission security, data storage security and confidentiality security. The paper discusses the security problem and coping strategy of database data in a data trusteeship environment. Two-phase sub-keys encryption algorithm is used to encrypt the data and also analysis its usability and security. The realized method is further presented. The algorithm solves the data security problem of database in a data trusteeship environment effectively and further enhances the security of database data.


2014 ◽  
Vol 496-500 ◽  
pp. 2069-2072
Author(s):  
Yong Hong Yu ◽  
Li Wu

Ensuring data correctness and data completeness in cloud computing, in addition to security technologies, many other factors need also be considered, such as the behaviors of participants of cloud computing. This paper discusses the data correctness and completeness in cloud computing based on the perspective of game theory. It built a complete information static game theory frame between a trusted data center and an un-trusted database service provider, and gave the mixed strategy Nash equilibrium. It also proposed some countermeasures and suggestions to improve the data security in cloud computing.


Author(s):  
Xinjie Cui ◽  
Robyn Blackadar

ABSTRACT ObjectivesUsing existing data for research can generate new knowledge and evidence for policy with relatively little cost. Privacy concerns are paramount in such secondary usage of data collected on human subjects. Information privacy protection and data security are critical considerations in reuse and repurposing of data especially linked data, longitudinal data, and large amounts of data. Data sharing and privacy protection are both in the public interest and we need to assess the risk of “doing” (sharing) as well as the risk of “not doing” (not sharing or not protecting).    ApproachThe Alberta Centre for Child Family and Community Research (the Centre) establishes the Child Youth Data Lab that links and analyzes administrative data from multiple provincial ministries and the Child Data Centre of Alberta that repurposes research data and manages its access for reuse. The Centre partners with provincial Office of the Information Privacy Commissioner, Research Ethics Boards and leaders in the research communities and technology industry to design and develop measures to enable secondary use while safeguarding the data, and to explore and adopt best practices on data sharing processes, governance, and technologies. ResultsIn principle current privacy laws and regulations provide good guidance in collection, use, and disclosure of data, however there is a lack of consistency in the interpretation of these laws at the operational level with regard to secondary data use. The experiences of establishing different data sharing models at the Centre through multiple initiatives are discussed. Cross-sectoral broad partnership brings understanding and builds trusting relationships, which are crucial to establishing data sharing processes. The recognition of the significance of secondary data use to provide direction for policy and program development at the executive level provides commitment for data sharing initiatives. Strong governance structure consists multi-level ministry and multiple stakeholder involvement ensures ongoing support and engagement. The highest data security standards and anonymous solution for data linkage enables the sharing of data with good privacy protection. ConclusionSecondary use of data to improve system performance and contributing to scientific discovery has been broadly recognized. A balance between utility and privacy can be realized through broad partnership in building proper governance, technology, processes and policies.


2020 ◽  
Author(s):  
Tamra Lysaght ◽  
Angela Ballantyne ◽  
Vicki Xafis ◽  
Serene Ong ◽  
Gerald Owen Schaefer ◽  
...  

Abstract Background We aimed to examine the ethical concerns Singaporeans have about sharing health-data for precision medicine (PM) and identify suggestions for governance strategies. Just as Asian genomes are under-represented in PM, the views of Asian populations about the risks and benefits of data sharing are under-represented in prior attitudinal research.Methods We conducted seven focus groups with 62 participants in Singapore from May to July 2019. They were conducted in three languages (English, Mandarin and Malay) and analysed with qualitative content and thematic analysis. Results Four key themes emerged: nuanced understandings of data security and data sensitivity; trade-offs between data protection and research benefits; trust (and distrust) in the public and private sectors; and governance and control options. Participants were aware of the inherent risks associated with data sharing for research. Participants expressed conditional support for data sharing, including genomic sequence data and information contained within electronic medical records. This support included sharing data with researchers from universities and healthcare institutions, both in Singapore and overseas. Support was conditional on the perceived social value of the research and appropriate de-identification and data security processes. Participants suggested that a data sharing oversight body would help strengthen public trust and comfort in data research for PM in Singapore.Conclusion Maintenance of public trust in data security systems and governance regimes can enhance participation in PM and data sharing for research. Contrary to themes in much prior research, participants demonstrated a sophisticated understanding of the inherent risks of data sharing, analysed trade-offs between risks and potential benefits of PM, and often adopted an international perspective.


Sign in / Sign up

Export Citation Format

Share Document