Context-Aware Authentication to Protect Data Access: in Cloud Environments Identity and Access Management Applied by Context-Aware Authentication

Author(s):  
Claudio Augusto N. Ferraz ◽  
Edgard Costa Oliveira ◽  
Ari Melo Mariano
2015 ◽  
Vol 50 (5) ◽  
pp. 1-10
Author(s):  
Alen Bardizbanyan ◽  
Magnus Själander ◽  
David Whalley ◽  
Per Larsson-Edefors

2019 ◽  
Vol 7 (4) ◽  
pp. 225
Author(s):  
Made Dimas Dwi Sutanegara ◽  
Cokorda Rai Adi Pramartha

PT. Telkom Indonesia is a State-Owned Enterprise (BUMN) that provides the largest telecommunications and network services in Indonesia. Data Access Management (DAMAN) is one of the divisions whose task is to update SISKA data, purify network data, and generate Iranian Optical Distribution Purpose (ODP). ODP functions as a protection or place for fiber optic cables at each Telkom pole. ODP can be viewed through the starclik website, for ODP that is not visible on the platform it could be because full ODP or ODP data is not correct on the server, due to the possibility that the field staff did not report the latest data to the division. So that it requires an ODP reporting reminder system to reduce errors that do not arise from ODP.


2019 ◽  
Author(s):  
Xiaochen Zheng ◽  
Shengjing Sun ◽  
Raghava Rao Mukkamala ◽  
Ravi Vatrapu ◽  
Joaquín Ordieres-Meré

BACKGROUND Huge amounts of health-related data are generated every moment with the rapid development of Internet of Things (IoT) and wearable technologies. These big health data contain great value and can bring benefit to all stakeholders in the health care ecosystem. Currently, most of these data are siloed and fragmented in different health care systems or public and private databases. It prevents the fulfillment of intelligent health care inspired by these big data. Security and privacy concerns and the lack of ensured authenticity trails of data bring even more obstacles to health data sharing. With a decentralized and consensus-driven nature, distributed ledger technologies (DLTs) provide reliable solutions such as blockchain, Ethereum, and IOTA Tangle to facilitate the health care data sharing. OBJECTIVE This study aimed to develop a health-related data sharing system by integrating IoT and DLT to enable secure, fee-less, tamper-resistant, highly-scalable, and granularly-controllable health data exchange, as well as build a prototype and conduct experiments to verify the feasibility of the proposed solution. METHODS The health-related data are generated by 2 types of IoT devices: wearable devices and stationary air quality sensors. The data sharing mechanism is enabled by IOTA’s distributed ledger, the Tangle, which is a directed acyclic graph. Masked Authenticated Messaging (MAM) is adopted to facilitate data communications among different parties. Merkle Hash Tree is used for data encryption and verification. RESULTS A prototype system was built according to the proposed solution. It uses a smartwatch and multiple air sensors as the sensing layer; a smartphone and a single-board computer (Raspberry Pi) as the gateway; and a local server for data publishing. The prototype was applied to the remote diagnosis of tremor disease. The results proved that the solution could enable costless data integrity and flexible access management during data sharing. CONCLUSIONS DLT integrated with IoT technologies could greatly improve the health-related data sharing. The proposed solution based on IOTA Tangle and MAM could overcome many challenges faced by other traditional blockchain-based solutions in terms of cost, efficiency, scalability, and flexibility in data access management. This study also showed the possibility of fully decentralized health data sharing by replacing the local server with edge computing devices.


Sensors ◽  
2019 ◽  
Vol 19 (12) ◽  
pp. 2817
Author(s):  
Zhen-Yu Wu

“Education Cloud” is a cloud-computing application used in educational contexts to facilitate the use of comprehensive digital technologies and establish data-based learning environments. The immense amount of digital resources, data, and teaching materials involved in these environments must be stored in robust data-access systems. These systems must be equipped with effective security mechanisms to guarantee confidentiality and ensure the integrity of the cloud-computing environment. To minimize the potential risk of privacy exposure, digital sharing service providers must encrypt their digital resources, data, and teaching materials, and digital-resource owners must have complete control over what data or materials they share. In addition, the data in these systems must be accessible to e-learners. In other words, data-access systems should not only encrypt data, but also provide access control mechanisms by which users may access the data. In cloud environments, digital sharing systems no longer target single users, and the access control by numerous users may overload a system and increase management burden and complexity. This study addressed these challenges to create a system that preserves the benefits of combining digital sharing systems and cloud computing. A cloud-based and learner-centered access control mechanism suitable for multi-user digital sharing was developed. The proposed mechanism resolves the problems concerning multi-user access requests in cloud environments and dynamic updating in digital-sharing systems, thereby reducing the complexity of security management.


2011 ◽  
Vol 57 (4) ◽  
pp. 1978-1985 ◽  
Author(s):  
Hiromi Narimatsu ◽  
Hiroyuki Kasai

Sign in / Sign up

Export Citation Format

Share Document