scholarly journals Enhancing Privacy for Big Data in Healthcare Domain based on Cryptographic and Decentralized Technology Methods

Privacy is one of the biggest concerns that hinder most organizations to adopt the Big Data technology. Some mechanisms and systems have been set-up to handle huge databases. Nevertheless, the scalability requirements of Big Data are far beyond the conventional databases to handle. Therefore, it is trivial to set-up scalable privacy algorithms for conventional databases. Most data are stored in a single location, which means the records it keeps are open and effortlessly irrefutable to third parties. Centralized versions of this data make it too easy for hackers to attack. As such, in this paper, we present the opportunities and challenges of implementing cryptography and blockchain for privacy perseverance in Big Data, focusing in the healthcare domain. In addition, we also present some use cases of integrating Directed Acyclic Graph (DAG) into healthcare database framework for anchoring information security and privacy.

2020 ◽  
Vol 218 ◽  
pp. 04008
Author(s):  
Yang Shen

In the era of big data, due to the great influence of big data itself, Internet information security has also become the focus of attention. In order to avoid disturbing people’s lives, this article summarizes the opportunities and challenges in the era of big data based on previous work experience. This article analyzes and studies five aspects including establishing complete laws and regulations, protecting personal information, applying big data technology to public security systems, doing a good job in data management and classification, and ensuring the security of data transmission. The author discusses specific measures for the maintenance of Internet information security in the era of big data from the above five aspects.


Author(s):  
Cuibi Yang ◽  
Shuliang Huan ◽  
Yong Yang

Rain classroom is a big data tool that effectively connects the teacher with students throughout the teaching process. This paper mainly applies rain classroom in blended teaching of college students, and evaluates the application effect. Firstly, the authors set up a model of rain classroom, covering all three phases of the teaching process: before-class (B), in-class (I) and after-class (A). Next, the BIA model was applied to the course Film and Television Appreciation, and the key issues in each phase were explained. To evaluate the effect of the BIA model, two questionnaire surveys were carried out among engineering students in Chongqing Three Gorges University. The results show that rain classroom can greatly improve the learning effect of the target course in various aspects: the teacher could arouse the students’ learning interest by sending red packets, make students more attentive through limited-time quiz, and reduce the absence through random roll call; the students were actively involved in group activities and confident in presenting their findings; however, many students most students switched to other apps in the class. The research results provide new insights to the application of big data technology in college education.


Author(s):  
Cheng-yong Liu ◽  
Chih-Chun Hou

AbstractBig data-based credit reference system gradually attracts wide attention due to its ad-vantages in remedying the shortages of traditional credit reference and dealing with new challenges arising from financial credit management. Nevertheless, this new method is also adapted through different studies and experiments to be problematic with island of credit information and information security. Some researchers begin exploring the possibility of applying blockchain technology to the individual credit reference field. The business links in the individual credit reference can be innovated through the blockchain mechanism so that credit data from different industries get collected through peering points, secure communication and anonymous protection on the basis of such techniques as distributed storage, point-to-point transmission, consensus mechanism and encryption algorithm. In this way, it is feasible to solve island of information and enhance the protection of user information security. A promising future can be expected about the big data-based credit reference, but there are also many problems with blockchain-based credit reference in China.


2021 ◽  
Vol 2021 ◽  
pp. 1-8
Author(s):  
Yi Guan ◽  
Qian Chen

Since the 21st century, the development of network technology has entered a new stage, and mankind has gradually entered the era of big data with information explosion. Computer big data technology has changed people’s lifestyles. People can obtain information and materials without going out to provide convenience for people’s lives. But it is affected in many ways, but we will also encounter some difficulties in the process of using it. Informatization has had a profound impact on many areas of human social life. Especially in the context of global informationization, the information security (IS) problems encountered by China at this stage are more prominent and obvious than ever before. IS issues have also become a hot topic for many scholars to pay attention to and study. Informatization has gradually penetrated into every aspect of daily production work. However, the flow of enterprise informatization has made the public suffer from IS problems while improving office efficiency. This paper analyzes the shortcomings of current enterprise IS situation awareness; studies the construction of enterprise IS situation awareness system through big data technology, artificial intelligence algorithm, and threat intelligence technology; and puts forward the enterprise level IS situation awareness system model, situation awareness system, architecture, and specific implementation method. After analyzing the system design and deployment, the threats to corporate IS can be discovered in a more timely manner, and based on risk judgment and threat tracking, the company’s detection capabilities against security threats and security attacks can be improved, and effective security incident handling can be provided. Supported by technical means, the security situational awareness system will bring different protection and prevention to our enterprise.


2020 ◽  
Vol 38 (5/6) ◽  
pp. 979-995
Author(s):  
Shanying Zhu ◽  
Vijayalakshmi Saravanan ◽  
BalaAnand Muthu

Purpose Currently, in the health-care sector, information security and privacy are increasingly important issues. The improvement in information security is highlighted in adopting digital patient records based on regulation, providers’ consolidation, and the growing need to exchange information among patients, providers, and payers. Design/methodology/approach Big data on health care are likely to improve patient outcomes, predict epidemic outbreaks, gain valuable insights, prevent diseases, reduce health-care costs and improve analysis of the quality of life. Findings In this paper, the big data analytics-based cybersecurity framework has been proposed for security and privacy across health-care applications. It is vital to identify the limitations of existing solutions for future research to ensure a trustworthy big data environment. Furthermore, electronic health records (EHR) could potentially be shared by various users to increase the quality of health-care services. This leads to significant issues of privacy that need to be addressed to implement the EHR. Originality/value This framework combines several technical mechanisms and environmental controls and is shown to be enough to adequately pay attention to common threats to network security.


2014 ◽  
Vol 1049-1050 ◽  
pp. 1934-1937 ◽  
Author(s):  
Ning Ning Sun ◽  
Li Hua Ma

In the big data era, the security and protection of users’ privacy have become a research focus of libraries, especially the protection for users’ data privacy is of vital importance. This paper analyzes and discusses the features of libraries in big data era, discusses the influence of big data era on information security of libraries, and proposes big data-related scientific problems which shall be solved in terms of information security.


Sign in / Sign up

Export Citation Format

Share Document