scholarly journals Resistance of The Polynomial Scheme of Confidential Data Split Transmission

2018 ◽  
pp. 38-45
Author(s):  
Vladimir Deundyak ◽  
◽  
Nadezhda Mogilevskaya ◽  
◽  
Electronics ◽  
2021 ◽  
Vol 10 (9) ◽  
pp. 1005
Author(s):  
Rakan A. Alsowail ◽  
Taher Al-Shehari

As technologies are rapidly evolving and becoming a crucial part of our lives, security and privacy issues have been increasing significantly. Public and private organizations have highly confidential data, such as bank accounts, military and business secrets, etc. Currently, the competition between organizations is significantly higher than before, which triggers sensitive organizations to spend an excessive volume of their budget to keep their assets secured from potential threats. Insider threats are more dangerous than external ones, as insiders have a legitimate access to their organization’s assets. Thus, previous approaches focused on some individual factors to address insider threat problems (e.g., technical profiling), but a broader integrative perspective is needed. In this paper, we propose a unified framework that incorporates various factors of the insider threat context (technical, psychological, behavioral and cognitive). The framework is based on a multi-tiered approach that encompasses pre, in and post-countermeasures to address insider threats in an all-encompassing perspective. It considers multiple factors that surround the lifespan of insiders’ employment, from the pre-joining of insiders to an organization until after they leave. The framework is utilized on real-world insider threat cases. It is also compared with previous work to highlight how our framework extends and complements the existing frameworks. The real value of our framework is that it brings together the various aspects of insider threat problems based on real-world cases and relevant literature. This can therefore act as a platform for general understanding of insider threat problems, and pave the way to model a holistic insider threat prevention system.


2020 ◽  
Vol 2020 ◽  
pp. 1-16
Author(s):  
Ijaz Ahmad Awan ◽  
Muhammad Shiraz ◽  
Muhammad Usman Hashmi ◽  
Qaisar Shaheen ◽  
Rizwan Akhtar ◽  
...  

The tremendous growth of computational clouds has attracted and enabled intensive computation on resource-constrained client devices. Predominantly, smart mobiles are enabled to deploy data and computational intensive applications by leveraging on the demand service model of remote data centres. However, outsourcing personal and confidential data to the remote data servers is challenging for the reason of new issues involved in data privacy and security. Therefore, the traditional advanced encryption standard (AES) algorithm needs to be enhanced in order to cope with the emerging security threats in the cloud environment. This research presents a framework with key features including enhanced security and owner’s data privacy. It modifies the 128 AES algorithm to increase the speed of the encryption process, 1000 blocks per second, by the double round key feature. However, traditionally, there is a single round key with 800 blocks per second. The proposed algorithm involves less power consumption, better load balancing, and enhanced trust and resource management on the network. The proposed framework includes deployment of AES with 16, 32, 64, and 128 plain text bytes. Simulation results are visualized in a way that depicts suitability of the algorithm while achieving particular quality attributes. Results show that the proposed framework minimizes energy consumption by 14.43%, network usage by 11.53%, and delay by 15.67%. Hence, the proposed framework enhances security, minimizes resource utilization, and reduces delay while deploying services of computational clouds.


2014 ◽  
Vol 33 (11) ◽  
pp. 1928-1945 ◽  
Author(s):  
Thais Paiva ◽  
Avishek Chakraborty ◽  
Jerry Reiter ◽  
Alan Gelfand

2018 ◽  
Vol 30 (4) ◽  
pp. 14-31 ◽  
Author(s):  
Suyel Namasudra ◽  
Pinki Roy

This article describes how nowadays, cloud computing is one of the advanced areas of Information Technology (IT) sector. Since there are many hackers and malicious users on the internet, it is very important to secure the confidentiality of data in the cloud environment. In recent years, access control has emerged as a challenging issue of cloud computing. Access control method allows data accessing of an authorized user. Existing access control schemes mainly focus on the confidentiality of the data storage. In this article, a novel access control scheme has been proposed for efficient data accessing. The proposed scheme allows reducing the searching cost and accessing time, while providing the data to the user. It also maintains the security of the user's confidential data.


PCD Journal ◽  
2021 ◽  
Vol 9 (1) ◽  
pp. 23-45
Author(s):  
Irit Talmor ◽  
Osnat Osnat Akirav

During pre-election campaigns, parties make great efforts to persuade constituents to vote for them. Usually, new parties have smaller budgets and fewer resources than veteran parties. Generally, the more heterogeneous the party’s electorate, the more critical the issue of resource allocation. This paper presents a method for new parties to efficiently allocate campaign advertising resources and maximise voters. The model developed uses the Pareto principle and multi-criteria approach, integrating the party’s confidential data together with official open-to-all data. We implemented the model on a specific new party during the intensive political period before the April 2019 elections in Israel, finding that the model produced clear and unbiased results, and this made it effective and user-friendly for strategy teams and campaign managers.


Author(s):  
Anees Banu

When it comes to preventing unauthorised access to, destruction of, or inspection of confidential data, information security has always been a major factor. Multimedia information is now used in every field throughout the world. The confidential information that is used in these areas must be kept secure. There are a variety of methods for keeping data secure. One of these is steganography, which is concealing information within other data into a format that the cover information remains unchanged. Cryptography, an encryption process that scrambles data into a written form that is sometimes referred to as a hash, is an auxiliary approach for securing information. Steganography and cryptography each have their own set of benefits and drawbacks. Even though both technologies give security, it is usually a good practise to combine Cryptographic algorithms to create additional layers of security. When cryptographic with steganography are combined, a multi-layer security paradigm is created. The proposed work's main goal is to add an additional layer of protection by using cryptography and steganography to encrypt and embed secret data conveyed across an insecure channel.


2021 ◽  
Vol 29 (6) ◽  
pp. 0-0

Data security incidents are continually increasing; hackers, governments, and other actors increasingly attempt to gain unauthorized access to confidential data. Information Systems (IS) users are becoming more vulnerable to the risks of data breaches. Many stakeholders perceive cybersecurity incidents as indicators of firms' operational and technological internal deficiencies. Previous research has revealed that investors react negatively to data breaches, yet little is known about investors' reactions to material data security incidents. Using a sample of 232 data security incidents for 132 publicly traded companies in the United States, we applied an event study methodology to discern investors' reactions to material versus immaterial incidents. We also use multivariate regression and time-to-event analysis to examine what determines the degree of investors' reactions, considering several intervals around the event day. Our results show that investors perceive material data security incidents as a deficiency of breached companies in comparison to immaterial incidents.


2018 ◽  
Vol 3 (2) ◽  
pp. 76 ◽  
Author(s):  
Terrica Ramnauth ◽  
Mary Benitez ◽  
Brandy Logan ◽  
Samuel P. Abraham ◽  
Deborah Gillum

Problem: A review of the literature indicated that human trafficking is a worldwide problem and not all nurses in the healthcare setting were adequately trained to identify and care for human trafficking victims.Purpose: The purpose of this study was to further explore nurses’ awareness regarding human trafficking.Method: This quantitative, cross-sectional, non-experimental study with a descriptive design, studied the issue by administering a survey to nurses actively working in the field. The theoretical framework of forced labor and Orem’s self-care deficit nursing theory were used to guide the study. The data were collected using SurveyMonkey®, an Internet-based confidential data-collection tool. The survey contained eight demographic questions and sixteen Likert-type statements. The researchers obtained personal email addresses and used Facebook contacts to send out the survey initially. In this study, a Snowball sampling was used to obtain nurse participants.Results: A total of 166 responses were received from nurses across the United States. The results confirmed that there is a lack of awareness among nurses about human trafficking. An increase in both training and education amongst nurses could increase the number of victims, which go unnoticed, being saved or provided with assistance. Nurses also must be more self-aware about the patients they are encountering and be more observant of signs that look suspicious. The most agreed upon statement by participants was that counseling should be available to people who are affected by human trafficking (M = 3.75, SD = 0.48).


2013 ◽  
Vol 8 (1) ◽  
pp. 265-278 ◽  
Author(s):  
Carl Lagoze ◽  
William C. Block ◽  
Jeremy Williams ◽  
John Abowd ◽  
Lars Vilhuber

Social science researchers increasingly make use of data that is confidential because it contains linkages to the identities of people, corporations, etc. The value of this data lies in the ability to join the identifiable entities with external data, such as genome data, geospatial information, and the like. However, the confidentiality of this data is a barrier to its utility and curation, making it difficult to fulfil US federal data management mandates and interfering with basic scholarly practices, such as validation and reuse of existing results. We describe the complexity of the relationships among data that span a public and private divide. We then describe our work on the CED2AR prototype, a first step in providing researchers with a tool that spans this divide and makes it possible for them to search, access and cite such data.


Sign in / Sign up

Export Citation Format

Share Document