Security and Privacy-Enhancing Technologies for Blockchain and Cryptocurrency

2020 ◽  
pp. 133-150
Author(s):  
Debasis Gountia ◽  
Utkalika Satapathy
2019 ◽  
Vol 2019 (1) ◽  
pp. 87-107 ◽  
Author(s):  
Alexandros Mittos ◽  
Bradley Malin ◽  
Emiliano De Cristofaro

Abstract Rapid advances in human genomics are enabling researchers to gain a better understanding of the role of the genome in our health and well-being, stimulating hope for more effective and cost efficient healthcare. However, this also prompts a number of security and privacy concerns stemming from the distinctive characteristics of genomic data. To address them, a new research community has emerged and produced a large number of publications and initiatives. In this paper, we rely on a structured methodology to contextualize and provide a critical analysis of the current knowledge on privacy-enhancing technologies used for testing, storing, and sharing genomic data, using a representative sample of the work published in the past decade. We identify and discuss limitations, technical challenges, and issues faced by the community, focusing in particular on those that are inherently tied to the nature of the problem and are harder for the community alone to address. Finally, we report on the importance and difficulty of the identified challenges based on an online survey of genome data privacy experts.


Author(s):  
George Yee

Many applications and tools have been developed to support the design and delivery of distance learning courses. Unfortunately, many of these applications have only cursory provisions for security and privacy, such as authentication based only on user id and password. Given the increased attacks on networked applications and the increased awareness of personal privacy rights, this situation is unacceptable. Indeed, electronic services of all kinds, including distance learning, will never be fully successful until the users of these services are confident that their information is protected from unauthorized access and their privacy assured. In the literature, there are few papers dealing specifically with security and privacy for distance education. El-Khatib, Korba, Xu and Yee (2003) discuss security and privacy for e-learning in terms of legislative requirements, standards and privacy-enhancing technologies. Korba, Yee, Xu, Song, Patrick and El-Khatib (2004) investigate how security and privacy can promote user trust in agent-supported distributed learning. Yee and Korba (2003, 2004) discuss the use and negotiation of privacy policies for distance education. Lin, Korba, Yee and Shih (2004) describe the application of security and privacy technologies to distance learning tools. Yee, Korba, Lin and Shih (2005) present an approach for using context-aware agents to implement security and privacy in distance learning. Holt and Fraser (2003) discuss the psychological and pedagogical motivation for security and privacy.


Author(s):  
Uppuluri Sirisha ◽  
G. Lakshme Eswari

This paper briefly introduces Internet of Things(IOT) as a intellectual connectivity among the physical objects or devices which are gaining massive increase in the fields like efficiency, quality of life and business growth. IOT is a global network which is interconnecting around 46 million smart meters in U.S. alone with 1.1 billion data points per day[1]. The total installation base of IOT connecting devices would increase to 75.44 billion globally by 2025 with a increase in growth in business, productivity, government efficiency, lifestyle, etc., This paper familiarizes the serious concern such as effective security and privacy to ensure exact and accurate confidentiality, integrity, authentication access control among the devices.


Author(s):  
Shaveta Bhatia

 The epoch of the big data presents many opportunities for the development in the range of data science, biomedical research cyber security, and cloud computing. Nowadays the big data gained popularity.  It also invites many provocations and upshot in the security and privacy of the big data. There are various type of threats, attacks such as leakage of data, the third party tries to access, viruses and vulnerability that stand against the security of the big data. This paper will discuss about the security threats and their approximate method in the field of biomedical research, cyber security and cloud computing.


2017 ◽  
Vol 3 (2) ◽  
pp. 29
Author(s):  
NURHAZIRAH HASHIM ◽  
MOHAMMAD ZAIM MOHD SALLEH ◽  
NOR SARA NADIA MUHAMAD YUNUS ◽  
INTAN SYAFINAZ MAT SHAFIE

The recent development in the ecommerce services has shown a variety of established companies participating in the web business environment including Islamic banks. Business with the mostexperience and success in using ecommerce are beginning to realize that the indicator of success or failure of the ecommerce environment was included in the online services. Nowadays, the trend ofa business is to serve the customer with best quality of services to enhance the consumer satisfaction and compete with the global competitors as online services enabled registered user to make productspurchase transaction only through website such as check and manage financial standing, transfer funds, bill payment, prepaid reload and so forth. However, in recent times, Islamic banking users faced problems with the online system such as cannot log in to the system, payment failure and  mostly security and privacy hindrance. Therefore, this study aimed to investigate the relationship between electronic service quality (e-SERVQUAL) and customer satisfaction towards IslamicOnline Banking Services users. Based on the sample size, only 76 respondents were selected to participate in this study by using a convenience sampling. Further, Pearson correlation and multipleregression were reported to analyze the mentioned relationship. The findings have shown that there is a positive relationship between e-SERVQUAL and customer satisfaction in using Islamic onlinebanking services. Based on the findings, Islamic online banking developer is recommended to improve more on their responsiveness in order to provide quick response to their customer’s requirements.  Moreover, they also should be more reliable in providing accurate information in performing the promised services. They must assure that all of their customers can quickly get responds and true feedback regarding their problems to ensure customer satisfy with service provided. Besides, the safety of the website and the protection of customer information alsoconsidered a vital action that should be concerned in order to increase the customers’ satisfaction.


Sign in / Sign up

Export Citation Format

Share Document