scholarly journals Research on Privacy Data Protection Based on Trusted Computing and Blockchain

2021 ◽  
Vol 2021 ◽  
pp. 1-9
Author(s):  
Linkai Zhu ◽  
Sheng Peng ◽  
Zhiming Cai ◽  
Wenjian Liu ◽  
Chunjiang He ◽  
...  

Aiming at the problems of low protection accuracy and long time consumption in traditional privacy data protection methods, a privacy data protection method based on trusted computing and blockchain is proposed. Set up the Internet node secure transmission protocol through the trusted node uplink transmission protocol and the downlink transmission protocol, and according to the transmission protocol, combined with the blockchain technology, the ECC elliptic curve encryption algorithm is used to encrypt the amount of data existing in the blockchain, and the AES symmetric encryption algorithm is used to encrypt the private data that exists in the nonblockchain, thereby completing the protection of network private data. The simulation experiment results show that the privacy data protection accuracy of the proposed method is higher and the work efficiency is faster.

Author(s):  
Israa Al_Barazanchi ◽  
Aparna Murthy ◽  
Ahmad AbdulQadir Al Rababah ◽  
Ghadeer Khader ◽  
Haider Rasheed Abdulshaheed ◽  
...  

Blockchain innovation has picked up expanding consideration from investigating and industry over the later a long time. It permits actualizing in its environment the smart-contracts innovation which is utilized to robotize and execute deals between clients. Blockchain is proposed nowadays as the unused specialized foundation for a few sorts of IT applications. Blockchain would aid avoid the duplication of information because it right now does with Bitcoin and other cryptocurrencies. Since of the numerous hundreds of thousands of servers putting away the Bitcoin record, it’s impossible to assault and alter. An aggressor would need to change the record of 51 percent of all the servers, at the precise same time. The budgetary fetched of such an assault would distantly exceed the potential picks up. The same cannot be said for our private data that lives on single servers possessed by Google and Amazon. In this paper, we outline major Blockchain technology that based as solutions for IOT security. We survey and categorize prevalent security issues with respect to IoT data privacy, in expansion to conventions utilized for organizing, communication, and administration. We diagram security necessities for IoT together with the existing scenarios for using blockchain in IoT applications.


2021 ◽  
Vol 12 ◽  
pp. 215013272098771
Author(s):  
S. M. Rashed Ul Islam ◽  
Tahmina Akther ◽  
Md. Abdullah Omar Nasif ◽  
Sharmin Sultana ◽  
Saif Ullah Munshi

SARS-CoV-2 initially emerged in Wuhan, China in late 2019. It has since been recognized as a pandemic and has led to great social and economic disruption globally. The Reverse Transcriptase Real-Time Polymerase Chain Reaction (rtRT-PCR) has become the primary method for COVID-19 testing worldwide. The method requires a specialized laboratory set up. Long-term persistence of SARS-CoV-2 RNA in nasopharyngeal secretion after full clinical recovery of the patient is regularly observed nowadays. This forces the patients to spend a longer period in isolation and test repeatedly to obtain evidence of viral clearance. Repeated COVID-19 testing in asymptomatic or mildly symptomatic cases often leads to extra workload for laboratories that are already struggling with a high specimen turnover. Here, we present 5 purposively selected cases with different patterns of clinical presentations in which nasopharyngeal shedding of SARS-CoV-2 RNA was observed in patients for a long time. From these case studies, we emphasized the adoption of a symptom-based approach for discontinuing transmission-based precautions over a test-based strategy to reduce the time spent by asymptomatic and mildly symptomatic COVID-19 patients in isolation. A symptom-based approach will also help reduce laboratory burden for COVID-19 testing as well as conserve valuable resources and supplies utilized for rtRT-PCR testing in an emerging lower-middle-income setting. Most importantly, it will also make room for critically ill COVID-19 patients to visit or avail COVID-19 testing at their convenience.


2021 ◽  
Vol 23 (11) ◽  
pp. 381-401
Author(s):  
Umar Abdullahi Tawfiq ◽  
◽  
Shohaimi Shamarina ◽  
Syafinaz Amin Nordin ◽  
Mohd Noor Hisham Mohd Nadzir ◽  
...  

Typhoid is a life-threatening disease that has remained endemic in parts of Africa and Asia where its burden is elevated by the inefficiency of control efforts which have been hampered by lack of epidemiological data, among others. In Nigeria, such data is absent in most of the States like Gombe where the disease has been rife for a long time, hence, to bridge that knowledge gap, this study was set up to determine the host-associated risk factors for typhoid occurrence and recurrence in Gombe. A questionnaire that was designed and validated for this location was used to obtain data from 663 respondents using simple random sampling and analyzed using the Chi-square test for association and binomial logistic regression to obtain risk factors for typhoid occurrence and recurrence, respectively. The study revealed that occurrences were statistically significantly associated with the variables for vaccination (χ2 = 39.729, p < 0.01), having houseboy/girl (χ2 = 16.909, p < 0.01), typhoid patient at home (χ2 = 13.393, p < 0.01), hand washing before handling food (χ2 = 22.856, p < 0.01), consuming iced/frozen items (χ2 = 16.805, p < 0.01), boiling drinking water (χ2 = 49.633, p < 0.01), and eating commercially available foods/drinks (χ2 = 27.864, p < 0.01), while recurrences were statistically significantly predicted by „not sure of been vaccinated‟ (OR = 2.962, CI = 1.290 to 6.802, p < 0.01), „not having another typhoid patient at home‟ (OR = 1.799, CI = 0.998 to 3.244, p < 0.01), and „drinking unboiled water sometimes‟ (OR = 2.130, CI = 1.023 to 4.434, p < 0.01). It is believed that these findings will guide efforts by the Government for health interventions against typhoid in the study area, thus improving the quality of life for the population.


2020 ◽  
Vol 9 (2) ◽  
pp. 3-7
Author(s):  
Tang Minh Chau

Highland is a typical area in Vietnam with a great deal of unique things for people to study and discover. Among them are culture and language, the two reciprocal elements to create communities called Hill tribes. Original Hill tribes came to the Highland long time ago and set up their life based on their root culture until now. When studying about Hill tribes, we realize that their culture is very interesting and worth tracing. Therefore, how to conserve Hill tribes’ culture is what we need to take into consideration as soon as possible.


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Eli Gimmon ◽  
Christian Felzensztein

PurposeTo better understand the emergence of small-scale entrepreneurial firms in the under-researched transition economy of Cuba.Design/methodology/approachGiven the scarcity of reliable publicly available information and restrictions on private data collection in Cuba, in-depth interviews were conducted with a panel of small-scale entrepreneurs at three different points in time. Evolutions are analyzed over this period.FindingsFamily can overcome institutional constraints by helping the entrepreneur deal with market and social obstacles. Despite the absence of a supportive entrepreneurial ecosystem, these new entrepreneurs and their families have been able to transform longstanding passive attitudes into positive steps to set up new small-scale ventures in a country facing unprecedented internal and external challenges.Originality/valueA new conceptual model of family support for entrepreneurship in transition economies is presented. The findings lend weight to institutional theory on overcoming constraints in emerging markets and extend the theory of family entrepreneurship to new transition economies.


LAW REVIEW ◽  
2018 ◽  
Vol 37 (01) ◽  
Author(s):  
Kalrav Krishna Tripathi

a nascent stage. The requirement for computer forensics has been gaining importance with each passing day and the increasing forms and manners of cybercrimes and litigations involving parties of a larger institutional character. It is a sine qua non for every organization in contemporary times to employ the services of a computer forensics agency or hire a specialized expert from the said field to maintain the security of the organizations with respect to cybercrimes and data protection. Major quantum of losses, at unexpected times caused by cybercrimes with to various organizations has resulted in creating a keen interest with respect to the same. The main scope and significance of this paper is the understanding of the working as well as importance of Cyber Forensics in the modern age. In the wake of this and recent incidents in relation to cyber-crimes as such due importance must be given to the studies relating to the same and Cyber Forensics is one of them. It focuses on India and its interaction with crime via Cyber Forensics. The paper proceeds on the ground that there is a growing need for advancement in the field of cyber forensics in order to keep up with the spurt in crimes related to computers. In the present legal set up there is a need for procedural guidelines to deal with cyber-crimes.


Author(s):  
Mamata Rath

Social network and its corresponding website permits a client to make a profile, set up an authorized account to create a digital representation of themselves, to select other members of the site as contacts, make connections with them, communicate and engage with these users in different social activities, etc. So, social network includes details of persons, group details, their friends list, contact list, business, affiliations, personal data, personal preferences, and historical information. In this age of smart communication and technology, most of the time people are connected with mobile smart telephones in their work culture, home, office, or any other related places. As they are constantly associated with social systems for long time, they get new posts, messages, and current refreshed news readily available in a flash. This is the constructive part of social networking that individuals consistently remain refreshed with most recent news and innovation. This chapter presents an overview of social network design, various issues, and emerging trends that are evolved simultaneously with modern age. It also presents a detail study on application and impact of social network in modern society as well as exhibits an exhaustive review of security measures in social sites.


Sign in / Sign up

Export Citation Format

Share Document