Managing Data Security Risk in Model Software As A Service (SAAS)

Author(s):  
Nooraidaniza Jafri ◽  
Maryati Mohd Yusof
Author(s):  
Pradeep Kumar Tiwari ◽  
Sandeep Joshi

Researchers have done tremendous works for data security, but a robust security mechanism is not available yet. Researchers are doing continuous work to build robust SaaS mechanism. SaaS has several security vulnerabilities. Data security is still the most important challenge to researcher and they can constantly do research to protect the data over the network but they are facing numerous technical challenges to completely secure the cloud network and cloud storage. This work would be helpful to understand data security and privacy problems. Researchers can find the new way to understand SaaS security vulnerabilities and currently available solutions.


Author(s):  
T. Rajani Devi ◽  
B. Rama

<span lang="EN-US">In component based software reusability development process, the software developers have to choose the best components which are self adaptive future to overcome the functional errors, framework mismatches, violation of user level privacy issues and data leakage feasibilities. The software developers can build high quality software applications by taking the consideration of the reusable components which are more suitable to provide high level data security and privacy. This paper has proposing the neural based fuzzy framework based approach to estimate the reusable components which are directly and indirectly involve the security and privacy to improve the quality of the software system. This approach has considered the twenty effecting factors and fifty three attribute matrices. It has formed with three stages of execution scenarios. The first stage has executed with eleven effecting factors and eighteen attribute matrices for identification of supporting software reusability components, the second stage has executed with four effecting factors and thirty five attribute matrices for identification of sub-internal relationships in terms of security-privacy, and the third stage has executed with eight effecting factors and six attribute matrices for identification of sub of sub-internal relationships in terms of security risk estimation. This analytical finding proposes a fuzzy logic model to evaluate the most feasible effecting factors that influence the enterprise level data security-privacy practices at real time environment.</span>


At the onset of liberalization, privatization and globalization, enterprise resource planning has become an integrated part of any business. It has become imperative for businesses to go in for IIoT. With implementation of IIoT and analytics companies can become more profitable and productivity can increase constantly. With this comes the risk of data security in ERP due to real time capturing huge volume of data in manufacturing plants, which are under security risk. This has forced the companies to implement measures to ensure that the product design and customer data are stored securely without compromising on business. This paper presents the possible sources of risk in IIoT and presents the solutions for preventing the risk.


Author(s):  
Balbir S. Barn ◽  
Ravinder Barn ◽  
Jo-Pei Tan

This article reports on a study of mobile phone usage by young people in the UK tertiary education sector. Responses from 397 respondents were analysed to explore the attitudes of young people towards data security issues for mobile devices. Results from the comparative analysis found that there were significant differences in data security risk concerns across ethnic groups. Those who reported extrovert personalities tend to take more risk in data security issues. In addition, young people who were 'technology savvy' were less likely to expose themselves to risk to data security issues through the use of free wifi and access of installed applications. It is argued that there is an urgent need for greater education and awareness of Information and Communication Technology (ICT) to reduce risk of cybercrime. The research reported here is part of a wider study looking at the overall communications and mobile phone usage of young people and taken as a whole, the paper contributes to this increasingly important area of Information Technology.


PLoS ONE ◽  
2020 ◽  
Vol 15 (12) ◽  
pp. e0243043
Author(s):  
Shekha Chenthara ◽  
Khandakar Ahmed ◽  
Hua Wang ◽  
Frank Whittaker ◽  
Zhenxiang Chen

The privacy of Electronic Health Records (EHRs) is facing a major hurdle with outsourcing private health data in the cloud as there exists danger of leaking health information to unauthorized parties. In fact, EHRs are stored on centralized databases that increases the security risk footprint and requires trust in a single authority which cannot effectively protect data from internal attacks. This research focuses on ensuring the patient privacy and data security while sharing the sensitive data across same or different organisations as well as healthcare providers in a distributed environment. This research develops a privacy-preserving framework viz Healthchain based on Blockchain technology that maintains security, privacy, scalability and integrity of the e-health data. The Blockchain is built on Hyperledger fabric, a permissioned distributed ledger solutions by using Hyperledger composer and stores EHRs by utilizing InterPlanetary File System (IPFS) to build this healthchain framework. Moreover, the data stored in the IPFS is encrypted by using a unique cryptographic public key encryption algorithm to create a robust blockchain solution for electronic health data. The objective of the research is to provide a foundation for developing security solutions against cyber-attacks by exploiting the inherent features of the blockchain, and thus contribute to the robustness of healthcare information sharing environments. Through the results, the proposed model shows that the healthcare records are not traceable to unauthorized access as the model stores only the encrypted hash of the records that proves effectiveness in terms of data security, enhanced data privacy, improved data scalability, interoperability and data integrity while sharing and accessing medical records among stakeholders across the healthchain network.


2019 ◽  
Vol 29 (3) ◽  
pp. 279-282
Author(s):  
Jeffrey Trageser ◽  
Judy E. Davidson

Because extensive data from medical records are gathered by organ procurement teams, the process of data transfer between sites created a data security risk. This includes the use of fax machines, courier services, and employees’ vehicles. Even health records transmitted over public Wi-Fi become at risk for a data breach. The Plan-Do-Study-Act method for performance improvement was used to address this time-consuming and labor-intensive process. A secured virtual private network from within the donor hospital site setting was developed to improve the transfer of images and data. The goal was to improve the process and increase data security. Once the new network was in place, the process steps decreased and eliminated data vulnerability. Average process time decreased by approximately 1 hour. Organs procured increased from pre (expected 3, observed 2) to post (expected 3, observed 5) implementation of the new process.


Sign in / Sign up

Export Citation Format

Share Document