scholarly journals Privacy and Security Issues Surrounding the Protection of Data Generated by Continuous Glucose Monitors

2017 ◽  
Vol 11 (2) ◽  
pp. 216-219 ◽  
Author(s):  
Katherine E. Britton ◽  
Jennifer D. Britton-Colonnese

Being able to track, analyze, and use data from continuous glucose monitors (CGMs) and through platforms and apps that communicate with CGMs helps achieve better outcomes and can advance the understanding of diabetes. The risks to patients’ expectation of privacy are great, and their ability to control how their information is collected, stored, and used is virtually nonexistent. Patients’ physical security is also at risk if adequate cybersecurity measures are not taken. Currently, data privacy and security protections are not robust enough to address the privacy and security risks and stymies the current and future benefits of CGM and the platforms and apps that communicate with them.

2019 ◽  
Vol 8 (3) ◽  
pp. 2295-2299

The smart management system plays a vital role in many domains and improves the reliability of protection and privacy of a system. Electrical systems have become a part in everyday human life. The next generation electrical systems will entirely depends on fully automated and smart control systems. In the present paper various mechanisms of cloud gateways and security issues are explored for smart management of an electrical system. The present survey work is reconnoitred with Internet of Things (IoT) in association with cloud. Cloud based IoT in smart electrical system provides potential enhancement of performance, management, and resilience of the smart system. However, the espousal of cloud based IoT system in smart electrical system to store and retrieve the data from cloud may increase risks in data privacy and security. Despite the different flaws in global integration of cloud with IoT through internet, various end-to-end security schemes are discussed to overcome these flaws. As a result in many of the applications easy IoT cloud gateway along with homomorphic encryption technique is set up to solve communication overheads and security issues.


Author(s):  
Rajendra Akerkar

A wide range of smart mobility technologies are being deployed within urban environment. These technologies generate huge quantities of data, much of them in real-time and at a highly granular scale. Such data about mobility, transport, and citizens can be put to many beneficial uses and, if shared, for uses beyond the system and purposes for which they were generated. Jointly, these data create the evidence base to run mobility services more efficiently, effectively, and sustainably. However, generating, processing, analyzing, sharing, and storing vast amounts of actionable data also raises several concerns and challenges. For example, data privacy, data protection, and data security issues arise from the creation of smart mobility. This chapter highlights the various privacy and security concerns and harms related to the deployment and use of smart mobility technologies and initiatives, and makes suggestions for addressing apprehensions about and harms arising from data privacy, protection, and security issues.


2018 ◽  
pp. 77-92 ◽  
Author(s):  
Srinivas Sethi ◽  
Sai Sruti

Cloud computing refers to the basic setup for an emerging model of service delivery, that has the advantage of decreasing the cost by sharing computing, infrastructure including storage resources. This can be combined with on-demand delivery mechanism relying on a pay-per-use model. Cloud computing offers an added level of risk because of essential services provided by it to a third party, which makes it difficult to maintain data privacy and security. Security in cloud computing is a critical aspect, which has various issues and challenges related to it. Cloud service providers/ brokers and the cloud service users should make aware of safety cloud. That is the cloud is safe enough from all kinds of the threats, so that the users do not face any problem like; loss of data or data theft. There is a possibility that, a malicious user can enters the cloud by imitating an authentic user, thus corrupt the entire cloud. It can affect many users who are sharing these types of clouds. This chapter mentions the list of parameters that disturb the security of the cloud. This also explores the cloud security issues and challenges faced by cloud service provider/brokers and cloud service users like; data, privacy, and infected application. Finally, it discusses the countermeasure for handling these issues and its challenges.


2008 ◽  
pp. 2427-2437
Author(s):  
Franklin Maxwell Haper

Data warehousing is a technology architecture designed to organize disparate data sources into a single repository of information. As such, it represents a strategy for creating the architecture necessary to support the vision of e-government. Data warehousing enables a new type of “decision intelligence” by providing access to historical trend data, typically difficult to retrieve through operational database systems. Government data warehousing is complex, expensive, and often fraught with data privacy and security issues. E-government goals may be met through a successful data-warehousing project, be it in the form of a more efficient, informed government or as a result of increased public access to information. But given the substantial barriers to success, a thorough planning and investigation process is necessary.


2020 ◽  
Vol 48 (S1) ◽  
pp. 154-158 ◽  
Author(s):  
Stacey A. Tovino

This article examines the privacy and security issues associated with mobile application-mediated health research, concentrating in particular on research conducted or participated in by independent scientists, citizen scientists, and patient researchers. Building on other articles in this issue that examine state research laws and state data protection laws as possible sources of privacy and security protections for mobile research participants, this article focuses on the lack of application of federal standards to mobile application-mediated health research. As discussed in more detail below, the voluminous and diverse data collected by some independent scientists who use mobile applications to conduct health research may be at risk for unregulated privacy and security breaches, leading to dignitary, psychological, and economic harms for which participants have few legally enforceable rights or remedies under current federal law. Federal lawmakers may wish to consider enacting new legislation that would require otherwise unregulated health data holders to implement reasonable data privacy, security, and breach notification measures.


Author(s):  
K. G. Srinivasa ◽  
Ganesh Hegde ◽  
G M Sideesh ◽  
Srinidhi Hiriyannaiah

With the advent of increasing breaches and of private data stored in a large number of public cloud storage providers by high level government organizations under the pretext of copyright infringements, national security etc, data privacy is gaining paramount importance. Cheap yet powerful system-on-chip computers like the Raspberry Pi and wide range of community supported software have made running one's own server without spending a lot, a reality. We explore open source cloud storage service alternatives and their feature parity, running one of these services to setup a personal cloud server to protect data privacy and security. We also take a look at the security issues, data availability, cost effectiveness and viability of deploying a personal cloud when compared to some popular public cloud storage providers.


2018 ◽  
Vol 12 (1) ◽  
pp. 3-28
Author(s):  
Tamás Szádeczky

As compared with traditional paper-based versions and the standard username-password login to e-Government services, the new electronic identity and travel documents have made on-site electronic and on-line authentication of citizen more comfortable and secure.The biometric passport was introduced in Hungary in 2006. A decade later the electronic identity card (eID) was implemented. The reason for the improvement of such documents is twofold: enhancing security features and performing new functions. The development is certainly welcome, but it also generates new types of risks, with which governments and citizens must take into account.In this paper, I will first analyze the most widespread technologies of data storage cards from the passive elements to the chipcards, including the biometric passport. The objective is to provide an overview of the technical development as a background to my paper. I will then proceed to an analysis of the relevant EU and national legal background, data elements, data protection and the functions (ePASS, eID, eSIGN) of the new Hungarian and German identity card, as well as the security risks and protection properties of the eID-type documents. The paper concludes with a summary of the lessons learned from and the risks involved in the current solutions in Hungary and Germany.


Sign in / Sign up

Export Citation Format

Share Document