scholarly journals A Case Study on the Development of a Data Privacy Management Solution Based on Patient Information

Sensors ◽  
2020 ◽  
Vol 20 (21) ◽  
pp. 6030
Author(s):  
Arielle Verri Lucca ◽  
Luís Augusto Silva ◽  
Rodrigo Luchtenberg ◽  
Leonardo Garcez ◽  
Xuzeng Mao ◽  
...  

Data on diagnosis of infection in the general population are strategic for different applications in the public and private spheres. Among them, the data related to symptoms and people displacement stand out, mainly considering highly contagious diseases. This data is sensitive and requires data privacy initiatives to enable its large-scale use. The search for population-monitoring strategies aims at social tracking, supporting the surveillance of contagions to respond to the confrontation with Coronavirus 2 (COVID-19). There are several data privacy issues in environments where IoT devices are used for monitoring hospital processes. In this research, we compare works related to the subject of privacy in the health area. To this end, this research proposes a taxonomy to support the requirements necessary to control patient data privacy in a hospital environment. According to the tests and comparisons made between the variables compared, the application obtained results that contribute to the scenarios applied. In this sense, we modeled and implemented an application. By the end, a mobile application was developed to analyze the privacy and security constraints with COVID-19.

2016 ◽  
Vol 8 (3) ◽  
Author(s):  
Neal D Goldstein ◽  
Anand D Sarwate

Health data derived from electronic health records are increasingly utilized in large-scale population health analyses. Going hand in hand with this increase in data is an increasing number of data breaches. Ensuring privacy and security of these data is a shared responsibility between the public health researcher, collaborators, and their institutions. In this article, we review the requirements of data privacy and security and discuss epidemiologic implications of emerging technologies from the computer science community that can be used for health data. In order to ensure that our needs as researchers are captured in these technologies, we must engage in the dialogue surrounding the development of these tools.


Subject IoT ecosystem. Significance The market for the Internet of Things (IoT) or connected devices is expanding rapidly, with no manufacturer currently forecast to dominate the supply chain. This has fragmented the emerging IoT ecosystem, triggering questions about interoperability and cybersecurity of IoT devices. Impacts Firms in manufacturing, transportation and logistics and utilities are expected to see the highest IoT spending in coming years. The pace of IoT adoption is inextricably linked to that of related technologies such as 5G, artificial intelligence and cloud computing. Data privacy and security will be the greatest constraint to IoT adoption.


2020 ◽  
Vol 9 (1) ◽  
pp. 2295-2299

There is exponential growth in the in the research industry of Internet of Things (IoT), but it is still vulnerable to privacy and security. Devices in the IoT having resourceconstraints and decentralized topology are not capable of conventional privacy and security approaches. The paper predominantly focuses on the survey in the IoT system. Where we can see the various issues in IoT. To overcome these issues researchers, use blockchain mechanism. Due to blockchain’s popularity and success this technology is incorporated into many other industries. Blockchain is a technology that is booming since a decade. Despite various advancements in blockchain there are issues that are still present in IoT that needs to undergo improvisation. Before going to design and implement a model based on blockchain it is essential to understand the issues and challenges met by earlier research works. The paper presents study on the previous challenges and the solutions which are presented to get rid of the problems. Some of the existing problems are as follows- When the data is collected from the IoT devices and stored using blockchain still the data is under constant threat due to lack of security mechanisms relating to authentication and data privacy. Hence, providing security to blockchain becomes of utmost importance. The goal of this paper is presenting a detailed survey of security mechanisms for IoT systems. Also, this survey examines and explores why providing security to IoT devices is important. Readers can ultimately get aware of the issues that are present in the IoT systems and how they can be overcome. The study is beneficial for those who are looking forward to deploying IoT applications. They can get to know what the prerequisites are to be met for a secure IoT system.


Symmetry ◽  
2022 ◽  
Vol 14 (1) ◽  
pp. 64
Author(s):  
A S M Touhidul Hasan ◽  
Shabnam Sabah ◽  
Rakib Ul Haque ◽  
Apubra Daria ◽  
Abdur Rasool ◽  
...  

Supply chain management (SCM) is essential for a company’s faster, efficient, and effective product life cycle. However, the current SCM systems are insufficient to provide product legitimacy, transaction privacy, and security. Therefore, this research proposes a secure SCM system for the authenticity of the products based on the Internet of Things (IoT) and blockchain technology. The IoT-enabled Quick Response (QR) scanner and the blockchain-integrated distributed system will allow all the SCM stakeholders to begin secure and private transactions for their products or services. Resulting, the consumer will receive an authentic and genuine product from the original producer. A lightweight asymmetric key encryption technique, i.e., elliptic curve cryptography (ECC) and Hyperledger Fabric-based blockchain technology with on-chain smart contracts are applied for distributed IoT devices to make the authentication process faster and lighter. Each SCM stakeholder is registered by the service provider and receives corresponding public and private keys, which will be used for the authentication process of the participants and IoT devices. The authenticated QR scanner records all transactions on the blockchain. Consequently, there will be no human intervention for the SCM transactions. The security and scalability analysis demonstrates that the proposed system is more secure and robust than other state-of-the-art techniques.


Information ◽  
2019 ◽  
Vol 10 (6) ◽  
pp. 207
Author(s):  
Saleh Ahmed ◽  
Mahboob Qaosar ◽  
Asif Zaman ◽  
Md. Anisuzzaman Siddique ◽  
Chen Li ◽  
...  

Selecting representative objects from a large-scale dataset is an important task for understanding the dataset. Skyline is a popular technique for selecting representative objects from a large dataset. It is obvious that the skyline computation from the collective databases of multiple organizations is more effective than the skyline computed from a database of a single organization. However, due to privacy-awareness, every organization is also concerned about the security and privacy of their data. In this regards, we propose an efficient multi-party secure skyline computation method that computes the skyline on encrypted data and preserves the confidentiality of each party’s database objects. Although several distributed skyline computing methods have been proposed, very few of them consider the data privacy and security issues. However, privacy-preserving multi-party skyline computing techniques are not efficient enough. In our proposed method, we present a secure computation model that is more efficient in comparison with existing privacy-preserving multi-party skyline computation models in terms of computation and communication complexity. In our computation model, we also introduce MapReduce as a distributive, scalable, open-source, cost-effective, and reliable framework to handle multi-party data efficiently.


Author(s):  
Alma Cruz

The objective of this study was to determine the effectiveness of a particular convergencemodel for IoT and blockchain. Multiple regression model was selected to determine the effectiveof a specific convergence model. Three convergence models were selected for this study, includingthe hybrid approach, the IoT-blockchain approach, and the IoT-IoT approach. The findingsindicated that there are issues with convergence between two different technologies. The otherfinding was that the hybrid model provided the best convergence platform for integrating IoT withblockchain. Regarding the IoT and blockchain, convergence challenges included the limitedcapacity of IoT devices to handle the nature of distributed ledgers. The recommendation is that theaspects of traditional blockchain should be redesigned because of new requirements of IoT,including smart contracts, consensus protocol, data privacy, and security.


2020 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Ado Adamou Abba Ari ◽  
Olga Kengni Ngangmo ◽  
Chafiq Titouna ◽  
Ousmane Thiare ◽  
Kolyang ◽  
...  

The Cloud of Things (IoT) that refers to the integration of the Cloud Computing (CC) and the Internet of Things (IoT), has dramatically changed the way treatments are done in the ubiquitous computing world. This integration has become imperative because the important amount of data generated by IoT devices needs the CC as a storage and processing infrastructure. Unfortunately, security issues in CoT remain more critical since users and IoT devices continue to share computing as well as networking resources remotely. Moreover, preserving data privacy in such an environment is also a critical concern. Therefore, the CoT is continuously growing up security and privacy issues. This paper focused on security and privacy considerations by analyzing some potential challenges and risks that need to be resolved. To achieve that, the CoT architecture and existing applications have been investigated. Furthermore, a number of security as well as privacy concerns and issues as well as open challenges, are discussed in this work.


2021 ◽  
Vol 2021 ◽  
pp. 1-12
Author(s):  
Xin Xie ◽  
Yu-Chi Chen

Blockchain has become very popular and suitable to the Internet of Things (IoT) field due to its nontamperability and decentralization properties. The number of IoT devices and leaders (who own IoT devices) is increased exponentially, and thus, data privacy and security are undoubtedly significant concerns. In this paper, we summarize some issues for the BeeKeeper system, a blockchain-based IoT system, proposed by Zhou et al., and then aim for presenting an improved solution for decentralized data aggregation (DDA) on IoT. Firstly, we formally state the security requirements of DDA. Secondly, we propose our basic DDA system by using secret sharing to improve its efficiency and smart contracts as the computing processors. Moreover, the proposed full-fledged system achieves data sharing (e.g., a leader to access data of others’ devices), which is realized by using local differential privacy and cryptographic primitives such as token-based encryption. Finally, to show the feasibility, we provide some implementations and experiments for the DDA systems.


Author(s):  
Georgi Derluguian

The author develops ideas about the origin of social inequality during the evolution of human societies and reflects on the possibilities of its overcoming. What makes human beings different from other primates is a high level of egalitarianism and altruism, which contributed to more successful adaptability of human collectives at early stages of the development of society. The transition to agriculture, coupled with substantially increasing population density, was marked by the emergence and institutionalisation of social inequality based on the inequality of tangible assets and symbolic wealth. Then, new institutions of warfare came into existence, and they were aimed at conquering and enslaving the neighbours engaged in productive labour. While exercising control over nature, people also established and strengthened their power over other people. Chiefdom as a new type of polity came into being. Elementary forms of power (political, economic and ideological) served as a basis for the formation of early states. The societies in those states were characterised by social inequality and cruelties, including slavery, mass violence and numerous victims. Nowadays, the old elementary forms of power that are inherent in personalistic chiefdom are still functioning along with modern institutions of public and private bureaucracy. This constitutes the key contradiction of our time, which is the juxtaposition of individual despotic power and public infrastructural one. However, society is evolving towards an ever more efficient combination of social initiatives with the sustainability and viability of large-scale organisations.


Urban Science ◽  
2021 ◽  
Vol 5 (2) ◽  
pp. 42
Author(s):  
Dolores Brandis García

Since the late 20th century major, European cities have exhibited large projects driven by neoliberal urban planning policies whose aim is to enhance their position on the global market. By locating these projects in central city areas, they also heighten and reinforce their privileged situation within the city as a whole, thus contributing to deepening the centre–periphery rift. The starting point for this study is the significance and scope of large projects in metropolitan cities’ urban planning agendas since the final decade of the 20th century. The aim of this article is to demonstrate the correlation between the various opposing conservative and progressive urban policies, and the projects put forward, for the city of Madrid. A study of documentary sources and the strategies deployed by public and private agents are interpreted in the light of a process during which the city has had a succession of alternating governments defending opposing urban development models. This analysis allows us to conclude that the predominant large-scale projects proposed under conservative policies have contributed to deepening the centre–periphery rift appreciated in the city.


Sign in / Sign up

Export Citation Format

Share Document