scholarly journals Permacoin: Repurposing Bitcoin Work for Data Preservation

Author(s):  
Andrew Miller ◽  
Ari Juels ◽  
Elaine Shi ◽  
Bryan Parno ◽  
Jonathan Katz
Keyword(s):  
2020 ◽  
Vol 2020 ◽  
pp. 1-10
Author(s):  
Fasee Ullah ◽  
Izhar Ullah ◽  
Atif Khan ◽  
M. Irfan Uddin ◽  
Hashem Alyami ◽  
...  

There is a need to develop an effective data preservation scheme with minimal information loss when the patient’s data are shared in public interest for different research activities. Prior studies have devised different approaches for data preservation in healthcare domains; however, there is still room for improvement in the design of an elegant data preservation approach. With that motivation behind, this study has proposed a medical healthcare-IoTs-based infrastructure with restricted access. The infrastructure comprises two algorithms. The first algorithm protects the sensitivity information of a patient with quantifying minimum information loss during the anonymization process. The algorithm has also designed the access polices comprising the public access, doctor access, and the nurse access, to access the sensitivity information of a patient based on the clustering concept. The second suggested algorithm is K-anonymity privacy preservation based on local coding, which is based on cell suppression. This algorithm utilizes a mapping method to classify the data into different regions in such a manner that the data of the same group are placed in the same region. The benefit of using local coding is to restrict third-party users, such as doctors and nurses, when trying to insert incorrect values in order to access real patient data. Efficiency of the proposed algorithm is evaluated against the state-of-the-art algorithm by performing extensive simulations. Simulation results demonstrate benefits of the proposed algorithms in terms of efficient cluster formation in minimum time, minimum information loss, and execution time for data dissemination.


Any organization is obliged to ensure secrecy of data from hacking criminals complying with the increasing demand for secured data. So data preservation is indispensablethrough cryptographic methods. It is adoptedseveralreal life applications such as ecommerce, In this paper we indicated a procedure for generating different Pythagorean triples and with the help of C++ coding developed a mechanism for both encoding and decoding of a plain text in English alphabets. We also demonstrated them with illustrative examples


Author(s):  
Hiroyuki Ochi ◽  
Toshihiko Ota ◽  
Ataru Yamaoka ◽  
Hiromasa Watanabe ◽  
Yohei Kondo ◽  
...  

Tábula ◽  
2021 ◽  
Author(s):  
Miguel Ángel Amutio Gómez

La orientación al dato en el contexto de la transformación digital lleva aparejada la aparición de nuevas regulaciones, dinámicas de gobernanza y roles, y servicios, junto con las correspondientes prácticas, instrumentos y estándares. A la vez se suscitan retos en relación con la ciberseguridad y la preservación de los datos. En este artículo se exponen la transformación digital y la orientación al dato, la proyección de lo anterior en la administración digital, el contexto de la Unión Europea, trayectoria y su orientación, aspectos de la interoperabilidad, ciberseguridad y preservación de los datos, cuestiones de gobernanza y roles en la orientación al dato y, finalmente, unas conclusiones. The data-driven approach in the context of digital transformation entails the appearance of new regulations, governance dynamics and roles, and services, together with the corresponding practices, instruments and standards. At the same time new challenges appear in relation to cybersecurity and data preservation. This article presents the digital transformation and data-driven approach, the impact in digital administration, the context of the European Union, trajectory and orientation towards the future, along with aspects of interoperability, cybersecurity and data preservation, as well as issues of governance and roles in data orientation and finally some conclusions.


2022 ◽  
pp. 352-368
Author(s):  
Cahyo Trianggoro ◽  
Abdurrakhman Prasetyadi

In recent decades, libraries, archives, and museums have created digital collections that comprise millions of objects to provide long-term access to them. One of the core preservation activities deals with the evaluation of appropriate formats used for encoding digital content. The development of science has entered the 4th paradigm, where data has become much more intensive than in the previous period. This situation raises new challenges in managing research data, especially related to data preservation in digital format, which allows research data to be utilized for the long term. The development of science in the 4th paradigm allows researchers to collaborate with and reuse research datasets produced by a research group. To take advantage of each other's data, there is a principle that must be understood together, namely the FAIR principle, an acronym for findable, accessible, interoperable, and reusable.


Information ◽  
2019 ◽  
Vol 10 (9) ◽  
pp. 274 ◽  
Author(s):  
Kalyan Nagaraj ◽  
Sharvani GS ◽  
Amulyashree Sridhar

With miscellaneous information accessible in public depositories, consumer data is the knowledgebase for anticipating client preferences. For instance, subscriber details are inspected in telecommunication sector to ascertain growth, customer engagement and imminent opportunity for advancement of services. Amongst such parameters, churn rate is substantial to scrutinize migrating consumers. However, predicting churn is often accustomed with prevalent risk of invading sensitive information from subscribers. Henceforth, it is worth safeguarding subtle details prior to customer-churn assessment. A dual approach is adopted based on dragonfly and pseudonymizer algorithms to secure lucidity of customer data. This twofold approach ensures sensitive attributes are protected prior to churn analysis. Exactitude of this method is investigated by comparing performances of conventional privacy preserving models against the current model. Furthermore, churn detection is substantiated prior and post data preservation for detecting information loss. It was found that the privacy based feature selection method secured sensitive attributes effectively as compared to traditional approaches. Moreover, information loss estimated prior and post security concealment identified random forest classifier as superlative churn detection model with enhanced accuracy of 94.3% and minimal data forfeiture of 0.32%. Likewise, this approach can be adopted in several domains to shield vulnerable information prior to data modeling.


2019 ◽  
Vol 6 (1) ◽  
pp. 205395171984254 ◽  
Author(s):  
Carl J Öhman ◽  
David Watson

We project the future accumulation of profiles belonging to deceased Facebook users. Our analysis suggests that a minimum of 1.4 billion users will pass away before 2100 if Facebook ceases to attract new users as of 2018. If the network continues expanding at current rates, however, this number will exceed 4.9 billion. In both cases, a majority of the profiles will belong to non-Western users. In discussing our findings, we draw on the emerging scholarship on digital preservation and stress the challenges arising from curating the profiles of the deceased. We argue that an exclusively commercial approach to data preservation poses important ethical and political risks that demand urgent consideration. We call for a scalable, sustainable, and dignified curation model that incorporates the interests of multiple stakeholders.


Sign in / Sign up

Export Citation Format

Share Document