scholarly journals Industrial Internet Federated Learning Driven by IoT Equipment ID and Blockchain

2021 ◽  
Vol 2021 ◽  
pp. 1-9
Author(s):  
Xu Zhang ◽  
Haibo Hou ◽  
Zhao Fang ◽  
Zhiqian Wang

With the development of Internet of Things (IoT), 5G, and industrial technology, Industrial Internet has become an emerging research field. Due to the industrial specialty, higher requirements are put forward for time delay, safety, and stability of the identification analysis service. The traditional domain name system (DNS) cannot meet the requirements of industrial Internet because of the single form of identification subject and weak awareness of security protection. As a solution, this work applies blockchain and federated learning (FL) to the industrial Internet identification. Blockchain is a decentralized infrastructure widely used in digital encrypted currencies such as Bitcoin, which can make secure data storage and access possible. Federated learning protects terminal personal data privacy and can carry out efficient machine learning among multiple participants. The numerical results justify that our proposed federated learning and blockchain combination lays a strong foundation for the development of future industrial Internet.

2019 ◽  
Vol 34 (3) ◽  
Author(s):  
Fanny Priscyllia

Perkembangan teknologi informasi dan komunikasi, salah satunya internet (interconnection networking). Informasi berupa data pribadi menjadi acuan dalam penggunaan aplikasi berbasis internet seperti e-commerce, e-health, e-payment, serta perkembangan cloud computing (ruang penyimpanan data seperti google drive, iCloud, Youtube). Privasi data pribadi merupakan hal penting karena menyangkut harga diri dan kebebasan berekspresi seseorang. Perlindungan privasi data pribadi jika tidak diatur dalam suatu peraturan perundang-undangan dapat mengakibatkan kerugian bagi seseorang atas tersebarnya suatu informasi pribadi. Kajian ini bertujuan untuk mendisukusikan konsep perlindungan privasi data pribadi serta pengaturannya dalam perspektif perbandingan hukum. Kajian ini menggunakan penelitian hukum normatif yang meneliti dan menganalisis sumber-sumber hukum. Hasil studi menunjukkan bahwa konsep perlindungan hak privasi merupakan hak penuh seseorang dan pemenuhannya tidak didasarkan pada hak orang lain, tetapi hak tersebut dapat hilang apabila dikehendaki oleh pemiliknya untuk mempublikasikan informasi yang bersifat pribadi kepada publik dan seseorang berhak untuk tidak membagikan semua informasi mengenai pribadinya dalam kehidupan sosial. Ketiadaan hukum yang mengatur secara komprehensif perlindungan privasi atas data pribadi di Indonesia dapat meningkatkan potensi pelanggaran terhadap hak konstitusional warga negara atas perlindungan privasi data pribadi. The development of information and communication technology, which one is the internet (interconnection networking). Personal data becomes a reference in the use of internet-based applications such as e-commerce, e-health, e-payment, and the development of cloud computing (data storage space such as Google Drive, iCloud, Youtube). The privacy of personal data is very important because it involves the freedom of expression and dignity of each individual. Data privacy protection shall be stipulated under the national law, if it is not, it may harm personal information that leads to any loss of someone. This paper aims to discuss the concept of privacy protection of personal data and legal arrangements from the perspective of comparative law. This article is normative legal research that examines and analyzes legal sources. The study results show that the privacy protection concept of personal data is a person rights and applied not by the others, but the rights can be lost if that person publish private information to the public and it’s a rights to does not share all information about his personality in social life. The absence of a comprehensive law governing privacy protection for personal data as a constitutional right can increase the potential of violations in Indonesia.


Author(s):  
Ronald M. Baecker

Fears about loss of privacy in computerized societies have been central to dystopian literature. The issue has also concerned thoughtful computer scientists and lawyers since the 1960s. By then, the scope of the computer revolution was making clear that governments and corporations could keep records about almost every aspect of our lives. As data storage became virtually limitless at trivial cost, effective uses of data grew, as did risks to personal privacy. We shall define privacy, look at its manifestations and roles, and discuss current and future threats to it. We shall introduce concepts that are key to understanding privacy, such as informed consent. A major concern is the threats to information privacy or data privacy, in which a person’s confidential information has errors or becomes exposed to people who should not be able to see or use it. We shall examine situations in which privacy can be invaded by governments, organizations, and individuals. Governments amass vast stores of personal data during the everyday course of administration and regulation. Government surveillance in many nations captures information that should be private, a topic we discussed in Chapter 6. Search engines, credit rating organizations, and insurance companies also gather huge amounts of data on consumers. When data is incorrect, or is hacked, there are serious implications for information privacy. Criminals seek to gain leverage by ferreting out computer-based data about personal financial transactions. Health information is a particularly sensitive area in which many people feel especially vulnerable. These are all ‘classical’ privacy concerns, the dangers of which were evident in the 1960s. New technologies have raised more concerns. Social media holds vast quantities of personal data that we have willingly disclosed, including information that could prove embarrassing later in life. A vivid example of a privacy breech was the Cambridge Analytica/Facebook scandal of 2018. New technologies raise new privacy concerns. Chips use GPS to track our location and movements. Recent advances in computer vision and the widespread deployment of video cameras enable face recognition. Chips located in the environment and embedded as sensors and prostheses in our bodies make our activities and even our moods accessible by others.


2020 ◽  
Vol 29 (01) ◽  
pp. 032-043 ◽  
Author(s):  
Hannah K. Galvin ◽  
Paul R. DeMuro

Objectives: To survey international regulatory frameworks that serve to protect privacy of personal data as a human right as well as to review the literature regarding privacy protections and data ownership in mobile health (mHealth) technologies between January 1, 2016 and June 1, 2019 in order to identify common themes. Methods: We performed a review of relevant literature available in English published between January 1, 2016 and June 1, 2019 from databases including PubMed, Google Scholar, and Web of Science, as well as relevant legislative background material. Articles out of scope (as detailed below) were eliminated. We categorized the remaining pool of articles and discrete themes were identified, specifically: concerns around data transmission and storage, including data ownership and the ability to re-identify previously de-identified data; issues with user consent (including the availability of appropriate privacy policies) and access control; and the changing culture and variable global attitudes toward privacy of health data. Results: Recent literature demonstrates that the security of mHealth data storage and transmission remains of wide concern, and aggregated data that were previously considered “de-identified” have now been demonstrated to be re-identifiable. Consumer-informed consent may be lacking with regard to mHealth applications due to the absence of a privacy policy and/or to text that is too complex and lengthy for most users to comprehend. The literature surveyed emphasizes improved access control strategies. This survey also illustrates a wide variety of global user perceptions regarding health data privacy. Conclusion: The international regulatory framework that serves to protect privacy of personal data as a human right is diverse. Given the challenges legislators face to keep up with rapidly advancing technology, we introduce the concept of a “healthcare fiduciary” to serve the best interest of data subjects in the current environment.


2021 ◽  
Vol 11 (2) ◽  
pp. 807
Author(s):  
Llanos Tobarra ◽  
Alejandro Utrilla ◽  
Antonio Robles-Gómez ◽  
Rafael Pastor-Vargas ◽  
Roberto Hernández

The employment of modern technologies is widespread in our society, so the inclusion of practical activities for education has become essential and useful at the same time. These activities are more noticeable in Engineering, in areas such as cybersecurity, data science, artificial intelligence, etc. Additionally, these activities acquire even more relevance with a distance education methodology, as our case is. The inclusion of these practical activities has clear advantages, such as (1) promoting critical thinking and (2) improving students’ abilities and skills for their professional careers. There are several options, such as the use of remote and virtual laboratories, virtual reality and game-based platforms, among others. This work addresses the development of a new cloud game-based educational platform, which defines a modular and flexible architecture (using light containers). This architecture provides interactive and monitoring services and data storage in a transparent way. The platform uses gamification to integrate the game as part of the instructional process. The CyberScratch project is a particular implementation of this architecture focused on cybersecurity game-based activities. The data privacy management is a critical issue for these kinds of platforms, so the architecture is designed with this feature integrated in the platform components. To achieve this goal, we first focus on all the privacy aspects for the data generated by our cloud game-based platform, by considering the European legal context for data privacy following GDPR and ISO/IEC TR 20748-1:2016 recommendations for Learning Analytics (LA). Our second objective is to provide implementation guidelines for efficient data privacy management for our cloud game-based educative platform. All these contributions are not found in current related works. The CyberScratch project, which was approved by UNED for the year 2020, considers using the xAPI standard for data handling and services for the game editor, game engine and game monitor modules of CyberScratch. Therefore, apart from considering GDPR privacy and LA recommendations, our cloud game-based architecture covers all phases from game creation to the final users’ interactions with the game.


Author(s):  
Daniel Amo ◽  
David Fonseca ◽  
Marc Alier ◽  
Francisco José García-Peñalvo ◽  
María José Casañ ◽  
...  

2021 ◽  
Vol 4 ◽  
Author(s):  
Vibhushinie Bentotahewa ◽  
Chaminda Hewage ◽  
Jason Williams

The growing dependency on digital technologies is becoming a way of life, and at the same time, the collection of data using them for surveillance operations has raised concerns. Notably, some countries use digital surveillance technologies for tracking and monitoring individuals and populations to prevent the transmission of the new coronavirus. The technology has the capacity to contribute towards tackling the pandemic effectively, but the success also comes at the expense of privacy rights. The crucial point to make is regardless of who uses and which mechanism, in one way another will infringe personal privacy. Therefore, when considering the use of technologies to combat the pandemic, the focus should also be on the impact of facial recognition cameras, police surveillance drones, and other digital surveillance devices on the privacy rights of those under surveillance. The GDPR was established to ensure that information could be shared without causing any infringement on personal data and businesses; therefore, in generating Big Data, it is important to ensure that the information is securely collected, processed, transmitted, stored, and accessed in accordance with established rules. This paper focuses on Big Data challenges associated with surveillance methods used within the COVID-19 parameters. The aim of this research is to propose practical solutions to Big Data challenges associated with COVID-19 pandemic surveillance approaches. To that end, the researcher will identify the surveillance measures being used by countries in different regions, the sensitivity of generated data, and the issues associated with the collection of large volumes of data and finally propose feasible solutions to protect the privacy rights of the people, during the post-COVID-19 era.


2018 ◽  
Vol 37 (4) ◽  
Author(s):  
Heidi Enwald

Open research data is data that is free to access, reuse, and redistribute. This study focuses on the perceptions, opinions and experiences of staff and researchers of research institutes on topics related to open research data. Furthermore, the differences across gender, role in the research organization and research field were investigated. An international questionnaire survey, translated into Finnish and Swedish, was used as the data collection instrument. An online survey was distributed through an open science related network to Finnish research organizations. In the end, 469 responded to all 24 questions of the survey. Findings indicate that many are still unaware or uncertain about issues related to data sharing and long-term data storage. Women as well as staff and researchers of medical and health sciences were most concerned about the possible problems associated with data sharing. Those in the beginning of their scientific careers, hesitated about sharing their data.


2019 ◽  
Vol 22 (1) ◽  
Author(s):  
Miguel Ehecatl Morales-Trujillo ◽  
Gabriel Alberto García-Mireles ◽  
Erick Orlando Matla-Cruz ◽  
Mario Piattini

Protecting personal data in current software systems is a complex issue that requires legal regulations and constraints to manage personal data as well as a methodological support to develop software systems that would safeguard data privacy of their respective users. Privacy by Design (PbD) approach has been proposed to address this issue and has been applied to systems development in a variety of application domains. The aim of this work is to determine the presence of PbD and its extent in software development efforts. A systematic mapping study was conducted in order to identify relevant literature that collects PbD principles and goals in software development as well as methods and/or practices that support privacy aware software development. 53 selected papers address PbD mostly from a theoretical perspective with proposals validation based primarily on experiences or examples. The findings suggest that there is a need to develop privacy-aware methods to be integrated at all stages of software development life cycle and validate them in industrial settings.


Sign in / Sign up

Export Citation Format

Share Document