scholarly journals SPIN: A Blockchain-Based Framework for Sharing COVID-19 Pandemic Information across Nations

2021 ◽  
Vol 11 (18) ◽  
pp. 8767
Author(s):  
Yazeed Alabdulkarim ◽  
Abdulmajeed Alameer ◽  
Mohammed Almukaynizi ◽  
Abdulaziz Almaslukh

The COVID-19 pandemic has caused many countries around the globe to put strict policies and measures in place in an attempt to control the rapid spread of the virus. These measures have affected economic activities and have impacted a broad range of businesses, such as international traveling, restaurants, and shopping malls. As COVID-19 vaccination efforts progress, countries are starting to relax international travel constraints and permit passengers from certain destinations to cross the border. Moreover, travelers from those destinations are likely required to provide certificates of vaccination results or negative COVID-19 tests before crossing the borders. Implementing these travel guidelines requires sharing information between countries, such as the number of COVID-19 cases and vaccination certificates for travelers. In this paper, we introduce SPIN, a framework leveraging a permissioned blockchain for sharing COVID-19 information between countries. This includes public data, such as the number of vaccinated people, and private data, such as vaccination certificates for individuals. Additionally, we employ cancelable fingerprint templates to authenticate private information about travelers. We analyze the framework from scalability, efficiency, security, and privacy perspectives. To validate our framework, we provide a prototype implementation using the Hyperledger Fabric platform.

Author(s):  
Barbara Carminati ◽  
Elena Ferrari ◽  
Andrea Perego

Web-based social networks (WBSNs) are online communities that allow users to publish resources (e.g., personal data, annotations, blogs) and to establish relationships, possibly of a different type (“friend,” “colleague,” etc.) for purposes that may concern business, entertainment, religion, dating, and so forth. In the last few years, the usage and diffusion of WBSNs has been increasing, with about 300 Web sites collecting the information of more than 400 million registered users. As a result, the “net model” is today used more and more to communicate, share information, make decisions, and ‘do business’ by companies and organizations (Staab et al., 2005). Regardless of the purpose of a WBSN, one of the main reasons for participating in social networking is to share and exchange information with other users. Recently, thanks to the adoption of Semantic Web technologies such as FOAF and other RDF-based vocabularies (Brickley & Miller, 2005; Davis & Vitiello, 2005; Golbeck, 2004), accessing and disseminating information over multiple WBSNs has been made simpler (Ding, Zhou, Finin, & Joshi, 2005). If this has been quite a relevant improvement towards an easier sharing of information, it makes more urgent that content owners have control over information access. In fact, making available possibly sensitive and private data and resources implies that they can be used by third parties for purposes different from the intended ones. As a matter of fact, users’ personal data and resources are regularly exploited not only by companies for marketing purposes, but also by governments and institutions for tracking persons’ behaviors and opinions, and in the worst case, by online predators (Barnes, 2006). It is then a challenging issue to devise security mechanisms for social networks, able to protect private information and regulate access to shared resources. In this article, besides providing an overview of the characteristics of the WBSN environment and its protection requirements, we illustrate the current approaches and future trends to social network security, with particular attention paid to the emerging technologies related to the so-called Web 2.0.


While Internet of Things (IoT) technology comprises of nodes that are self-configuring and intelligent which are interconnected in a dynamic network, utilization of shared resources has been revolutionized by the cloud computing effectively reducing the cost overheadamong the cloud users.The major concerns of IoT infrastructure are reliability, performance, security and privacy. Cloud computing is popular for its unlimited storage and processing power. Cloud computing is much more matured with the capability to resolve most of the issues in IoT technology. A suitable way to address most of the issues in IoT technology is by integrating IoTparadigm into the Cloud technology.In this regard, we propose a methodology of applying our EPAS scheme for IoT applications. In our previous work[2] , we have proposed an Enhanced Privacy preserving gene based data Aggregation Scheme (EPAS) for private data transmission and storage by utilizing Enhanced P-Gene erasable data hiding approach. Enhanced P-Gene scheme ensures secure transmission and storage of private data by relying on a data aggregation scheme fully dependent on erasable data hiding technique. In the current work we analyse the applicability of the EPAS scheme for IoT applications. Experimental results show the suitability of the proposed scheme for application involving numeric data and also demonstrates performance improvement with existing proposals for data aggregation in cloud.


2021 ◽  
Vol 11 (3-4) ◽  
pp. 1-22
Author(s):  
Qiang Yang

With the rapid advances of Artificial Intelligence (AI) technologies and applications, an increasing concern is on the development and application of responsible AI technologies. Building AI technologies or machine-learning models often requires massive amounts of data, which may include sensitive, user private information to be collected from different sites or countries. Privacy, security, and data governance constraints rule out a brute force process in the acquisition and integration of these data. It is thus a serious challenge to protect user privacy while achieving high-performance models. This article reviews recent progress of federated learning in addressing this challenge in the context of privacy-preserving computing. Federated learning allows global AI models to be trained and used among multiple decentralized data sources with high security and privacy guarantees, as well as sound incentive mechanisms. This article presents the background, motivations, definitions, architectures, and applications of federated learning as a new paradigm for building privacy-preserving, responsible AI ecosystems.


2021 ◽  
Vol 23 (09) ◽  
pp. 1105-1121
Author(s):  
Dr. Ashish Kumar Tamrakar ◽  
◽  
Dr. Abhishek Verma ◽  
Dr. Vishnu Kumar Mishra ◽  
Dr. Megha Mishra ◽  
...  

Cloud computing is a new model for providing diverse services of software and hardware. This paradigm refers to a model for enabling on-demand network access to a shared pool of configurable computing resources, that can be rapidly provisioned and released with minimal service provider interaction .It helps the organizations and individuals deploy IT resources at a reduced total cost. However, the new approaches introduced by the clouds, related to computation outsourcing, distributed resources and multi-tenancy concept, increase the security and privacy concerns and challenges. It allows users to store their data remotely and then access to them at any time from any place .Cloud storage services are used to store data in ways that are considered cost saving and easy to use. In cloud storage, data are stored on remote servers that are not physically known by the consumer. Thus, users fear from uploading their private and confidential files to cloud storage due to security concerns. The usual solution to secure data is data encryption, which makes cloud users more satisfied when using cloud storage to store their data. Motivated by the above facts; we have proposed a solution to undertake the problem of cloud storage security. In cloud storage, there are public data that do not need any security measures, and there are sensitive data that need applying security mechanisms to keep them safe. In that context, data classification appears as the solution to this problem. The classification of data into classes, with different security requirements for each class is the best way to avoid under security and over security situation. The existing cloud storage systems use the same Journal of University of Shanghai for Science and Technology ISSN: 1007-6735 Volume 23, Issue 9, September – 2021 Page-1105 key size to encrypt all data without taking into consideration its confidentiality level. Treating the low and high confidential data with the same way and at the same security level will add unnecessary overhead and increase the processing time. In our proposal, we have combined the K-NN (K Nearest Neighbors) machine learning method and the goal programming decision-making method, to provide an efficient method for data classification. This method allows data classification according to the data owner security needs. Then, we introduce the user data to the suitable security mechanisms for each class. The use of our solution in cloud storage systems makes the data security process more flexible, besides; it increases the cloud storage system performance and decreases the needed resources, which are used to store the data.


2021 ◽  
Vol 108 (Supplement_7) ◽  
Author(s):  
Hock Ping Cheah ◽  
Samantha Quah ◽  
Kenneth Wong

Abstract Aims Electronic communication amongst surgical team members improves the team's ability to care for patients. Security and privacy of patient data are significant concerns. Recent controversy involving private data collection with WhatsApp has led to many users changing to other forms of messaging apps to protect user privacy. The aim of this study is the analyse the efficiency and effectiveness of the Signal messaging app in a research setting in Australia. Methods Members of our research group comprising three junior doctors and a supervising consultant surgeon used the Signal app as our main method of communication to discuss matters relating to our various research projects. No patient details were discussed in the messaging app. Results A total of 234 personal and 148 group messages were sent during the study period in a group and personal message setting. Most messages including picture files sent were received within one minute by the recipient. We did encounter a 24 hour period where Signal encountered some technical difficulties and some messages did not go through. Conclusion Signal messaging app is a good alternative to WhatsApp messaging app with better user privacy protection. With more user uptake on Signal app, it has the potential to be used for clinical care as Signal also provides end-to-end encryption to protect patient privacy.


Author(s):  
N. Kapucu

The Internet is at once a new communications medium and a new locus for social organization on a global basis. A digital government will allow public access to government information and services, and group participation in discussions at any time and from anywhere on the globe. Digital government is regarded as the most recent development in the evolving application of electronic information technology to the performance of government. The development and migration of the technologies, as well as applications of information technology in support of government operations are other important aspects. New policies have been passed by legislative bodies to ensure the proper management and implementations of these technologies and the systems they serve, their protection from physical harm, and the security and privacy of their information. The growth of digital government has increased governments’ ability to collect, store, analyze, and disclose private personal and organizational information (Fountain, 2001). In the rapidly evolving environments of digital technology, it is impossible to anticipate the leading-edge ethical issues. However, there are solid ethical imperatives to use these principles ethical behavior for resolution of the issues (Anderson, 2004). This article will focus on privacy and confidentiality of individual private information in digital environment.


Author(s):  
Oladayo Olakanmi ◽  
Sekoni Oluwaseun

This article describes how taxi service is an essential means of mobility in many cities. Recent findings show that average automobile owners utilize their vehicles for only 5% of its time in a day. Therefore, the advent of autonomous vehicles and car sharing will make it possible for owners to engage their vehicles as taxis when not in use by utilizing its 95% free time for income generation. Sensitive private information is required to be released during a taxi service delivery, which may bring certain security and privacy issues and challenges. This may hinder the prospect of using autonomous vehicles as a form of taxi. As a result of these, the authors propose a secure and privacy-preserving taxi service framework for car sharing, which ensures protection of car owner and passengers personal details, e.g. identity, location, destination, etc. The authors developed a decay-based trust model for a framework in order to monitor and improve the quality of service rendered to passengers by vehicles. The decay-based trust model was simulated on the framework. The simulation of the decay-based trust model shows that it is a perfect model for rewarding vehicles which render good quality of service and blacklisting vehicles with frequent poor service delivery.


2020 ◽  
Vol 27 (4) ◽  
Author(s):  
Kristina M Angelo ◽  
Rhett J Stoney ◽  
Gaelle Brun-Cottan ◽  
Karin Leder ◽  
Martin P Grobusch ◽  
...  

Abstract Introduction International travellers contribute to the rapid spread of Zika virus (ZIKV) and its sentinel identification globally. We describe ZIKV infections among international travellers seen at GeoSentinel sites with a focus on ZIKV acquired in the Americas and the Caribbean, describe countries of exposure and traveller characteristics, and assess ZIKV diagnostic testing by site. Methods Records with an international travel-related diagnosis of confirmed or probable ZIKV from January 2012 through December 2019 reported to GeoSentinel with a recorded illness onset date were included to show reported cases over time. Records from March 2016 through December 2019 with an exposure region of the Americas or the Caribbean were included in the descriptive analysis. A survey was conducted to assess the availability, accessibility and utilization of ZIKV diagnostic tests at GeoSentinel sites. Results GeoSentinel sites reported 525 ZIKV cases from 2012 through 2019. Between 2012 and 2014, eight cases were reported, and all were acquired in Asia or Oceania. After 2014, most cases were acquired in the Americas or the Caribbean, a large decline in ZIKV cases occurred in 2018–19. Between March 2016 and December 2019, 423 patients acquired ZIKV in the Americas or the Caribbean, peak reporting to these regions occurred in 2016 [330 cases (78%)]. The median age was 36 years (range: 3–92); 63% were female. The most frequent region of exposure was the Caribbean (60%). Thirteen travellers were pregnant during or after travel; one had a sexually acquired ZIKV infection. There was one case of fetal anomaly and two travellers with Guillain-Barré syndrome. GeoSentinel sites reported various challenges to diagnose ZIKV effectively. Conclusion ZIKV should remain a consideration for travellers returning from areas with risk of ZIKV transmission. Travellers should discuss their travel plans with their healthcare providers to ensure ZIKV prevention measures are taken.


Electronics ◽  
2020 ◽  
Vol 9 (10) ◽  
pp. 1693
Author(s):  
Ahmad Kamran Malik ◽  
Naina Emmanuel ◽  
Sidra Zafar ◽  
Hasan Ali Khattak ◽  
Basit Raza ◽  
...  

The advent in Online Social Networks (OSN) and Internet of Things (IoT) has created a new world of collaboration and communication between people and devices. The domain of internet of things uses billions of devices (ranging from tiny sensors to macro scale devices) that continuously produce and exchange huge amounts of data with people and applications. Similarly, more than a billion people are connected through social networking sites to collaborate and share their knowledge. The applications of IoT such as smart health, smart city, social networking, video surveillance and vehicular communication are quickly evolving people’s daily lives. These applications provide accurate, information-rich and personalized services to the users. However, providing personalized information comes at the cost of accessing private information of users such as their location, social relationship details, health information and daily activities. When the information is accessible online, there is always a chance that it can be used maliciously by unauthorized entities. Therefore, an effective access control mechanism must be employed to ensure the security and privacy of entities using OSN and IoT services. Access control refers to a process which can restrict user’s access to data and resources. It enforces access rules to grant authorized users an access to resources and prevent others. This survey examines the increasing literature on access control for traditional models in general, and for OSN and IoT in specific. Challenges and problems related to access control mechanisms are explored to facilitate the adoption of access control solutions in OSN and IoT scenarios. The survey provides a review of the requirements for access control enforcement, discusses several security issues in access control, and elaborates underlying principles and limitations of famous access control models. We evaluate the feasibility of current access control models for OSN and IoT and provide the future development direction of access control for the same.


2002 ◽  
Vol 1 (4) ◽  
Author(s):  
Peter Adey

Surveillance is increasingly focused upon mobility. Be it in cities, shopping malls or outdoor 'public' spaces, surveillance is now able to track and monitor peoples movements. In recent years the most diverse forms of surveillance have been found at airports, yet paradoxically these spaces remain largely invisible within surveillance studies literature. This paper discusses a taxonomy of surveillance at the airport where several scales of mobility intersect – the global movements of international travel to local scale terminal activity. These are put under surveillance by techniques such as the passport and modern CCTV technologies. This paper illustrates the surveillant sorting that is perhaps most illustrative of airport surveillance, where airports can be seen to act as filters (Lyon, 2003) to the mobilities that pass through them. Using an Actor Network Theory (ANT) approach, trends to monitor the 'means of terrorism' are discussed in regard to the monitoring of objects and actors. The paper continues to critique the way by which we tend to focus chiefly upon the human subject of surveillance, often disregarding the surveillance of non-human actors.


Sign in / Sign up

Export Citation Format

Share Document