Method of Universal and Real-Time Telecommand Data Protection

2018 ◽  
Vol 08 (05) ◽  
pp. 730-737
Author(s):  
建 王
Keyword(s):  
2021 ◽  
Author(s):  
Michael Veale ◽  
Frederik Zuiderveen Borgesius

This paper discusses the troubled relationship between contemporary advertising technology (adtech) systems, in particular systems of real-time bidding (RTB, also known as programmatic advertising) underpinning much behavioural targeting on the web and through mobile applications. This paper analyses the extent to which practices of RTB are compatible with the requirements regarding (i) a legal basis for processing, transparency, and security in European data protection law. We first introduce the technologies at play through explaining and analysing the systems deployed online today. Following that, we turn to the law. Rather than analyse RTB against every provision of the General Data Protection Regulation (GDPR), we consider RTB in the context of the GDPR’s requirement of a legal basis for processing and the GDPR’s transparency and security requirements. We show, first, that the GDPR requires prior consent of the internet user for RTB, as other legal bases are not appropriate. Second, we show that it is difficult – and perhaps impossible – for website publishers and RTB companies to meet the GDPR’s transparency requirements. Third, RTB incentivises insecure data processing. We conclude that, in concept and in practice, RTB is structurally difficult to reconcile with European data protection law. Therefore, intervention by regulators is necessary.


2015 ◽  
Vol 24 ◽  
pp. 231-242 ◽  
Author(s):  
Shih-Hao Hung ◽  
Shuen-Wen Hsiao ◽  
Yu-Chi Teng ◽  
Roger Chien

Author(s):  
M G Padmashree* ◽  
◽  
J S Arunalatha ◽  
K R Venugopal ◽  
◽  
...  

The Internet of Things (IoT) associated with life is a budding real-time environment paradigm. Smart Users can control and analyze Things through Smart gadgets connected through the network. As gazillions of devices are connected and communicated via a complex, distributed network, the number of potential threats and attacks has grown drastically against protection and privacy. Security must be provided continuously for IoT service. Exploring the issues to be improved in IoT setup includes Information Secrecy, Access Control, Authentication, Integrity, Privacy, and Trust. The paper summarizes the issues with IoT device security and the efficiency of the existing security solutions. This paper analyses the schemes to guard IoT communications and the methods adopted by the researchers while providing security of data in IoT.


2020 ◽  
Vol 2020 ◽  
pp. 1-16 ◽  
Author(s):  
Jing Liu ◽  
Changbo Yuan ◽  
Yingxu Lai ◽  
Hua Qin

Industrial Internet technology has developed rapidly, and the security of industrial data has received much attention. At present, industrial enterprises lack a safe and professional data security system. Thus, industries urgently need a complete and effective data protection scheme. This study develops a three-layer framework with local/fog/cloud storage for protecting sensitive industrial data and defines a threat model. For real-time sensitive industrial data, we use the improved local differential privacy algorithm M-RAPPOR to perturb sensitive information. We encode the desensitized data using Reed–Solomon (RS) encoding and then store them in local equipment to realize low cost, high efficiency, and intelligent data protection. For non-real-time sensitive industrial data, we adopt a cloud-fog collaborative storage scheme based on AES-RS encoding to invisibly provide multilayer protection. We adopt the optimal solution of distributed storage in local equipment and the cloud-fog collaborative storage scheme in fog nodes and cloud nodes to alleviate the storage pressure on local equipment and to improve security and recoverability. According to the defined threat model, we conduct a security analysis and prove that the proposed scheme can provide stronger data protection for sensitive data. Compared with traditional methods, this approach strengthens the protection of sensitive information and ensures real-time continuity of open data sharing. Finally, the feasibility of our scheme is validated through experimental evaluation.


2021 ◽  
Author(s):  
Siham Hidar

Using pricing algorithms that make use of tracking results, companies can integrate in their pricing factors external to the company, which, in addition to the real-time market environment, may also include the presumed ability of individual customers to pay. This inevitably entails significant discrimination and privacy risks as well as the risk of non-transparent markets. The thesis addresses these aspects of the permissibility of smart pricing in terms of data protection and unfair competition law, comprehensively considering the economic and technical bases as well as the various forms of implementation, both online and offline. By evaluating the current legal situation, legally compliant implementation possibilities will be identified.


Author(s):  
Martijn Scherrenberg ◽  
Cindel Bonneux ◽  
Ines Frederix ◽  
Paul Dendale

Technology has become increasingly important in cardiac rehabilitation (CR). New technologies, such as smartwatches, have changed the landscape of real-time monitoring of ambulatory patients. Implementation of new technology is always accompanied by issues of concern. Relevant examples are inter-operability and data protection. However, new technologies mainly offer new opportunities such as improvements in tele-rehabilitation (teleCR), persuasive design and big data analysis.


Author(s):  
Ivan Tsmots ◽  
Vasyl Teslyuk ◽  
Taras Teslyuk ◽  
Yurii Lukashchuka

Background:: The modern stage of the development data protection and transmission systems is characterized by an extension of the application areas, most of which require encryption (decryption) and encoding (decoding) in real time on hardware that satisfy the restrictions on the dimensions, energy, cost and development time. In this connection, the problem of choosing an elemental base for the synthesis of neuro-like structures of symmetric encryption-decryption of data and means of encoding-decoding when transmitting data using noise-like codes becomes especially relevant. Methods:: Software implementation of data protection and transmission using noise-like codes involves the use of universal and functionally oriented microprocessors. In the programmatic implementation of neuro-like algorithms for encryption and decryption of data, computational processes are mostly expandable in time with a large volume of information transfer between the RAM and operating devices. Results:: In this work were performed series of element base selection simulations and synthesis of DPTS, with various technical parameters. During each simulation, the microcontroller, memory blocks, operating nodes and communication interfaces are selected. The simulation was performed on a MacBook Pro 2015 with a Core i7 processor and 16 GB of RAM. Conclusion:: It has been proposed to implement the real-time DPTS using noise-like codes by combining universal and special approaches based on the processor core supplemented by hardware with a table-algorithmic implementation of encryption (decryption) processes. The method of selection of the elemental base for synthesis of DPTS has been improved. A simulation model of element base selection for the synthesis of the DPTS has been developed. The system of synthesis of data protection and data transmission using noise-like codes has been developed.


Sign in / Sign up

Export Citation Format

Share Document