scholarly journals A Novel Fingerprinting Technique for Data Storing and Sharing through Clouds

Sensors ◽  
2021 ◽  
Vol 21 (22) ◽  
pp. 7647
Author(s):  
Mehvish Fatima ◽  
Muhammad Wasif Nisar ◽  
Junaid Rashid ◽  
Jungeun Kim ◽  
Muhammad Kamran ◽  
...  

With the emerging growth of digital data in information systems, technology faces the challenge of knowledge prevention, ownership rights protection, security, and privacy measurement of valuable and sensitive data. On-demand availability of various data as services in a shared and automated environment has become a reality with the advent of cloud computing. The digital fingerprinting technique has been adopted as an effective solution to protect the copyright and privacy of digital properties from illegal distribution and identification of malicious traitors over the cloud. Furthermore, it is used to trace the unauthorized distribution and the user of multimedia content distributed through the cloud. In this paper, we propose a novel fingerprinting technique for the cloud environment to protect numeric attributes in relational databases for digital privacy management. The proposed solution with the novel fingerprinting scheme is robust and efficient. It can address challenges such as embedding secure data over the cloud, essential to secure relational databases. The proposed technique provides a decoding accuracy of 100%, 90%, and 40% for 10% to 30%, 40%, and 50% of deleted records.

2014 ◽  
Vol 41 (6) ◽  
pp. 499 ◽  
Author(s):  
David J. Will ◽  
Karl J. Campbell ◽  
Nick D. Holmes

Context Worldwide, invasive vertebrate eradication campaigns are increasing in scale and complexity, requiring improved decision making tools to achieve and validate success. For managers of these campaigns, gaining access to timely summaries of field data can increase cost-efficiency and the likelihood of success, particularly for successive control-event style eradications. Conventional data collection techniques can be time intensive and burdensome to process. Recent advances in digital tools can reduce the time required to collect and process field information. Through timely analysis, efficiently collected data can inform decision making for managers both tactically, such as where to prioritise search effort, and strategically, such as when to transition from the eradication phase to confirmation monitoring. Aims We highlighted the advantages of using digital data collection tools, particularly the potential for reduced project costs through a decrease in effort and the ability to increase eradication efficiency by enabling explicit data-informed decision making. Methods We designed and utilised digital data collection tools, relational databases and a suite of analyses during two different eradication campaigns to inform management decisions: a feral cat eradication utilising trapping, and a rodent eradication using bait stations. Key results By using digital data collection during a 2-year long cat eradication, we experienced an 89% reduction in data collection effort and an estimated USD42 845 reduction in total costs compared with conventional paper methods. During a 2-month rodent bait station eradication, we experienced an 84% reduction in data collection effort and an estimated USD4525 increase in total costs. Conclusions Despite high initial capital costs, digital data collection systems provide increasing economics as the duration and scale of the campaign increases. Initial investments can be recouped by reusing equipment and software on subsequent projects, making digital data collection more cost-effective for programs contemplating multiple eradications. Implications With proper pre-planning, digital data collection systems can be integrated with quantitative models that generate timely forecasts of the effort required to remove all target animals and estimate the probability that eradication has been achieved to a desired level of confidence, thus improving decision making power and further reducing total project costs.


2018 ◽  
Vol 10 (12) ◽  
pp. 114 ◽  
Author(s):  
Shaukat Ali ◽  
Naveed Islam ◽  
Azhar Rauf ◽  
Ikram Din ◽  
Mohsen Guizani ◽  
...  

The advent of online social networks (OSN) has transformed a common passive reader into a content contributor. It has allowed users to share information and exchange opinions, and also express themselves in online virtual communities to interact with other users of similar interests. However, OSN have turned the social sphere of users into the commercial sphere. This should create a privacy and security issue for OSN users. OSN service providers collect the private and sensitive data of their customers that can be misused by data collectors, third parties, or by unauthorized users. In this paper, common security and privacy issues are explained along with recommendations to OSN users to protect themselves from these issues whenever they use social media.


2020 ◽  
Vol 11 (2) ◽  
pp. 161-170
Author(s):  
Rochman Hadi Mustofa

AbstractBig Data has become a significant concern of the world, along with the era of digital transformation. However, there are still many young people, especially in developing countries, who are not yet aware of the security of their big data, especially personal data. Misuse of information from big data often results in violations of privacy, security, and cybercrime. This study aims to determine how aware of the younger generation of security and privacy of their big data. Data were collected qualitatively by interviews and focus group discussions (FGD) from. Respondents were undergraduate students who used social media and financial technology applications such as online shopping, digital payments, digital wallet and hotel/transportation booking applications. The results showed that students were not aware enough and understood the security or privacy of their digital data, and some respondents even gave personal data to potentially scam sites. Most students are not careful in providing big data information because they are not aware of the risks behind it, socialization is needed in the future as a step to prevent potential data theft.


2015 ◽  
Vol 2015 ◽  
pp. 1-12 ◽  
Author(s):  
Mojca Volk ◽  
Janez Sterle ◽  
Urban Sedlar

This paper presents a case study on security and privacy implications on the design of a mobile application in digital health, the DeStress Assistant (DeSA) app, which utilizes sensing technologies and capabilities of the Internet of Things (IoT). An analysis of the applicable legislative framework is provided and selected challenges encountered during the app design are discussed, which are related with the practical implications of provisions of the international and national legislation for software applications in general as well as medical devices and handling of sensitive data in particular. We provide insights into design choices, including different possible scenarios for classification of a mobile app as a medical device and the pertaining legal risks the app developer is faced with as a consequence of possible legal obligations, and different possibilities of specifying the intended use. Also, we propose two designs of a mechanism that enables secure sharing of the patient’s health-related observations from the DeSA app with a medical professional within a treatment context. The first mechanism provides secure submission of health-related observations into a hospital information system, whereas the second mechanism enables secure short-term sharing of observations without storage.


2020 ◽  
Author(s):  
Gitanjali Gupta ◽  
Kamlesh Lakhwani

Abstract The data security and privacy have become a critical issue that restricts many cloud applications. One of the major concerns about security and privacy is the fact that cloud operators have the opportunity to access sensitive data. This concern dramatically increases user anxieties and reduces the acceptability of cloud computing in many areas, such as the financial industry and government agencies. This paper focuses on this issue and proposes an intelligent approach to cryptography, which would make it impossible for cloud service operators to reach sensitive data directly. The suggested method divides the file with precision using an intelligent classification technique. An alternative approach is designed to determine whether data packets need splitting to shorten operating time and reduce storage space. Our experimental assessments of both safety and efficiency performance and experimental results show that our approach can effectively address major cloud hazards and that it requires an acceptable computing time using an intelligent machine learning classification technique. We have proposed a novel approach entitled as a model for Security Aware Sensitive Encrypted Storage (SA-SES). In this model, we used our proposed algorithms, including Convolution Neural Network with Logistic Regression (CNN-LR), Elliptic-curve Diffie–Hellman-Shifted Adaption Homomorphism Encryption (ECDH-SAHE) and Elliptic-curve Diffie–Hellman-Shifted Adaption Homomorphism Decryption (ECDH-SAHD) .


2021 ◽  
Author(s):  
Sonia Sousa ◽  
Tiina Kalju

BACKGROUND The COVID-19 pandemic has caused changes on how we use technology across the world, both socially and economically. Due to the urgency and severity of the crisis different virus control measures were explored. One of the means how technology could help in this situation was by helping trace the contacts of people to prevent the spread of the disease. Many governments and public health authorities across the world have launched a number of contact tracing mobile apps (CTA). By the end of 2020, there are more than 50 contact tracing apps in both Google Play and iOS App Store [1]. Despite the wide availability, the download rates are low and usage rates are even lower [2][3]. There could be many reasons why the adoption is so low, but most certainly one variable that has been overlooked is the level of trust that potential users need to feel comfortable using an app. In Estonia, the CTA named HOIA has been developed as a means of digital contact tracing. By the middle of January 2021, there have been approximately 250 000 downloads but only 1763 (around 4,7% of all COVID-19 positive in Estonia by that time) people have registered as being tested COVID-19 positive [4]. It shows that HOIA has not proved to be efficient means to reduce the spread of the pandemic. Modeling evidence suggests that in order to be effective, the use of contact tracing apps would need to be very high, at least 80% of smartphone users to stop the pandemic [5]. 40% of Estonian people who don’t have HOIA do not believe that HOIA is effective and does what is promised. The concern about security and privacy was in the second place [6]. OBJECTIVE The goal of this study was to assess Estonian's trust towards the HOIA app and what has caused the shortage in trust. Namely, assess how much Estonians trust Covid-19 contact tracing app HOIA and what aspects are perceived as distrust by them. The study contributes to designers' understanding and awareness of designing trustworthy technology. METHODS The study comprised of measuring trust in HOIA CTA application using human-computer Trust psychometric scale [22]. A convenience sample was used in data collection, this includes all potential HOIA among the Estonian population. RESULTS Results indicate significant positive correlations between participants' trust towards the Estonian COVID tracing application (HOIA) and their perceptions of risk (p-value 0.000), competency (P-value 0.000), Benevolence (P-value=0.025), and reciprocity (P-value 0.015). CONCLUSIONS With the COVID-19 crisis, the new phenomenon of contact tracing apps was introduced to fight against the pandemic. CTAs were hoped to be a technological breakthrough to decrease the spread of the virus. However, this has not happened around the world. The same has happened in Estonia and evidence shows, that one of the reasons could be the low level of trust. The results of the study confirm, that trust in HOIA among Estonian habitants does affect their predisposition to use and indicated that participants do not believe HOIA is able to fulfill the main goal and decrease the spread of the virus. The result of this work is not only limited to HOIA but can be implemented by other CTAs as well. The results of this study contribute to designers' understanding and awareness of designing trustworthy technology. Eventually helps to provide design recommendations that ensure trustworthiness in the CTAs AI ability to use highly sensitive data and serve society. Regarding the limitations of this study, the survey was able to gather insight about the perceptions of HOIA, was enough to make a statistical generalization about the users’ perception and usage habits but more data needs to be collected if the intention is to generalize the results to the whole population of Estonia. Also, we should pay attention to the different minority groups to reach a valid conclusion. CLINICALTRIAL no trial registration.


Author(s):  
Kasarapu Ramani

Big data has great commercial importance to major businesses, but security and privacy challenges are also daunting this storage, processing, and communication. Big data encapsulate organizations' most important and sensitive data with multi-level complex implementation. The challenge for any organization is securing access to the data while allowing end user to extract valuable insights. Unregulated access privileges to the big data leads to loss or theft of valuable and sensitive. Privilege escalation leads to insider threats. Also, the computing architecture of big data is not focusing on session recording; therefore, it is becoming a challenge to identify potential security issues and to take remedial and mitigation mechanisms. Therefore, various big data security issues and their defense mechanisms are discussed in this chapter.


Author(s):  
Yessenia Berenice Llive ◽  
Norbert Varga ◽  
László Bokor

In the near future with the innovative services and solutions being currently tested and deployed for cars, homes, offices, transport systems, smart cities, etc., the user connectivity will considerably change. It means that smart devices will be connected to the internet and produce a big impact on the internet traffic, increasing the service demand generated by devices and sensors. However most of these devices are vulnerable to attacks. Hence, the security and privacy become a crucial feature to be included in towards its appropriate deployment. Interconnected, cooperative, service-oriented devices and their related hardware/software solutions will contain sensitive data making such systems susceptible to attacks and leakage of information. Therefore, robust secure communication infrastructures must be established to aid suitable deployment. This chapter is a state-of-the-art assessment of US and EU C-ITS security solutions.


Author(s):  
Tansif Ur Rehman

The practice of protecting computers, websites, mobile devices, electronic services, networks, and digital data from malicious attacks is known as cybersecurity. Since political, military, private, financial, and medical institutions collect, process, and maintain massive volumes of data on computers and other devices, cybersecurity is critical. Sensitive data, such as intellectual property, financial data, personal records, or other forms of data, can make up a large amount of the data. Improper access or disclosure to that data can have profound implications. Technology has undoubtedly made a significant change in every aspect of life in Pakistan, whether it is a financial or non-financial sphere. Technology's usage is thoroughly utilized by banks worldwide. They have started adopting it frequently because of the immense need to achieve goals and satisfy customer needs more efficiently. Almost all leading banks have now provided e-commerce facilities. Over time, more and more services and facilities are offered to bank customers conveniently via e-commerce products.


2019 ◽  
Vol 2019 ◽  
pp. 1-15 ◽  
Author(s):  
Yazan Al-Issa ◽  
Mohammad Ashraf Ottom ◽  
Ahmed Tamrawi

Cloud computing is a promising technology that is expected to transform the healthcare industry. Cloud computing has many benefits like flexibility, cost and energy savings, resource sharing, and fast deployment. In this paper, we study the use of cloud computing in the healthcare industry and different cloud security and privacy challenges. The centralization of data on the cloud raises many security and privacy concerns for individuals and healthcare providers. This centralization of data (1) provides attackers with one-stop honey-pot to steal data and intercept data in-motion and (2) moves data ownership to the cloud service providers; therefore, the individuals and healthcare providers lose control over sensitive data. As a result, security, privacy, efficiency, and scalability concerns are hindering the wide adoption of the cloud technology. In this work, we found that the state-of-the art solutions address only a subset of those concerns. Thus, there is an immediate need for a holistic solution that balances all the contradicting requirements.


Sign in / Sign up

Export Citation Format

Share Document