scholarly journals Data Protection through Data Security-as-a-Service using Blockchain Enabled Platform

2021 ◽  
Author(s):  
Magesh Kasthuri ◽  
Hitarshi Buch ◽  
Krishna Moorthy ◽  
Vinod Panicker

Data access is inevitable in today’s world and it is prone to threat attacks and hence data security is utmost important for any enterprise to handle industrial solutions. The economics of data being used across the industries rapidly growing in current digital world so the potential data related threats is also rapidly growing. Data security is an integrated solution component for any Enterprise solution but with the growing demand on data security and potential threat handling, Data Security as a Service (DSaaS)f is a new model widely accepted in modern age architecture in Blockchain and Big Data world combining the power of cloud based security services, decentralized network in Blockchain and tamper-proof ledger management. Any Enterprise Security architecture comprises of how data is handled in a secured way and how integration between services (consumers/producers or API interaction or any middleware services) handles data between them. Hence it is inevitable to that future technology adoption should include Data Security-as-a-service for zero-trust solution design complying with compliance and security standards for industry.

2012 ◽  
Vol 8 (1) ◽  
pp. 1-25 ◽  
Author(s):  
Geoffrey Karokola ◽  
Louise Yngström ◽  
Stewart Kowalski

E-Government offers many benefits to government agencies, citizens and the business community. However, e-Government services are prone to current and emerging security challenges posing potential threats to critical information assets. Securing it appears to be a major challenge facing governments globally. Based on the international security standards – the paper thoroughly investigates and analyzes eleven e-government maturity models (eGMMs) for security services. Further, it attempts to establish a common frame of reference for eGMM critical stages. The study utilizes the Soft Systems Methodology (SSM) of scientific inquiry/ learning cycle adopted from Checkland and Scholes. The findings show that security services (technical and non-technical) are lacking in eGMMs – implying that eGMMs were designed to measure more quantity of offered e-government services than the quality of security services. Therefore, as a step towards achieving secure e-government services the paper proposes a common frame of reference for eGMM with five critical stages. These stages will later be extended to include the required security services.


Author(s):  
Anirban Sengupta ◽  
Chandan Mazumdar

As enterprises become dependent on information systems, the need for effective Information Security Governance (ISG) assumes significance. ISG manages risks relating to the confidentiality, integrity and availability of information, and its supporting processes and systems, in an enterprise. Even a medium-sized enterprise contains a huge collection of information and other assets. Moreover, risks evolve rapidly in today’s connected digital world. Therefore, the proper implementation of ISG requires automation of the various monitoring, analysis, and control processes. This can be best achieved by representing information security requirements of an enterprise in a standard, structured format. This paper presents such a structured format in the form of Enterprise Security Requirement Markup Language (ESRML) Version 2.0. It is an XML-based language that considers the elements of ISO 27002 best practices.


Author(s):  
Hany F. EL Yamany ◽  
David S. Allison ◽  
Miriam A.M. Capretz

Security is one of the largest challenges facing the development of a Service-Oriented Architecture (SOA). This is due to the fact that SOA security is the responsibility of both the service consumer and service provider. In recent years, many solutions have been implemented, such as the Web Services Security Standards, including WS-Security and WS-SecurityPolicy. However, those standards are insufficient for the promising new generations of Web 2.0 applications. In this research, we describe an Intelligent SOA Security (ISOAS) framework and introduce four of its services: Authentication and Security Service (NSS), the Authorization Service (AS), the Privacy Service (PS) and the Service of Quality of Security Service (SQoSS). Furthermore, a case study is presented to examine the behavior of the described security services inside a market SOA environment.


Author(s):  
Anukul Pandey ◽  
Butta Singh ◽  
Barjinder Singh Saini ◽  
Neetu Sood

The primary objective of this chapter is to analyze the existing tools and techniques for medical data security. Typically, medical data includes either medical signals such as electrocardiogram, electroencephalogram, electromyography, or medical imaging like digital imaging and communications in medicine, joint photographic experts group format. The medical data are sensitive, subject to privacy preservation, and data access rights. Security in e-health field is an integrated concept which includes robust combination of confidentiality, integrity, and availability of medical data. Confidentiality ensures the data is inaccessible to unauthorized access. Integrity restricts the alteration in data by the unauthorized user. Whereas availability provides the readiness of the data when needed by the authorized user. Additionally, confidentiality, integrity and availability, accountability parameter records the back action list which answers the why, when, what, and whom data is accessed. The selected tools and techniques used in medical data security in e-health applications is discussed.


2011 ◽  
Vol 187 ◽  
pp. 358-361
Author(s):  
Hua Jiang ◽  
Jing Wen

As the low maintenance cost of data trusteeship, more and more medium-size and small size enterprises choose data trusteeship service. Data is valuable fortune of enterprise, security of enterprise data must be guaranteed in the condition of together using a same host. Data security includes data transmission security, data storage security and confidentiality security. The paper discusses the security problem and coping strategy of database data in a data trusteeship environment. Two-phase sub-keys encryption algorithm is used to encrypt the data and also analysis its usability and security. The realized method is further presented. The algorithm solves the data security problem of database in a data trusteeship environment effectively and further enhances the security of database data.


2013 ◽  
Vol 35 (1) ◽  
pp. 1-5 ◽  
Author(s):  
Kevin W. Hamlen ◽  
Bhavani Thuraisingham

Author(s):  
J. Bittencourt-Francisco ◽  

A connected society implies a new concept of cultural patrimony which starts to exist when the space is changing from physical to the one of data flow. Cyberspace and new technologies in cultural institutions provide up-to-date information to their public that has the potential of acting as a co-author by creating and sharing. Accessing cultural information of the museum's collection online through the screen or electronic device is a global trend and leads individuals to interact, exchange knowledge and absorb social change. Can one think that it is the “Digital Age” that is imposing itself on teaching during the pandemic? Can you imagine that everyone will migrate to digital on equal terms, including the population most vulnerable to poverty? Are digital educational resources within easy reach of the entire student community? Do all families have sufficient digital literacy and financial conditions to assist and enable their children to access and use digital tools? The answers seem obvious. It is not possible to disregard or pretend to be a minor problem, which was known before the covid-19: the digital inequality. It has already been revealed that the place where you live defines insertion in the digital world. The outskirts of Porto Alegre, like many others in Brazil, are full of families with school-age children who face serious obstacles to accessing the world wide web. Difficulties ranging from not being able to buy a computer to being unable to pay the cost of equipment or connection services. That is why they are classified, in the surveys, as “second-class users”, for making use of the internet based on more limited tools, such as cell phones, limited data access and access in public places. Digital inequalities connected with the pandemic. The article analyzes the connected Brazilian society and characterizes its involvement in the social media using the example of the museums of the city of Porto Alegre.


2021 ◽  
Vol 2021 ◽  
pp. 1-10
Author(s):  
Xiaodan Chen ◽  
Desheng Zeng ◽  
Shuanglong Pang ◽  
Fu Jun

In order to improve data security, ensure user privacy, and solve the problems of low data access control accuracy, long time consumption, and high energy consumption in traditional methods, a cloud computing storage data access control method based on dynamic re-encryption is proposed. The principal component analysis method is used to reduce the dimension of the cloud computing storage data, and the random forest algorithm is further used to classify and process the cloud computing storage data according to the processing results. On the basis of data preprocessing, an access control tree is established to obtain the correlation of data nodes. Finally, the dynamic re-encryption method is used for data security state transformation, and the data access control of cloud computing storage is realized through key generation, encryption, re-encryption key generation, and decryption. The experimental results show that the data access control accuracy of the method in this paper is high, time consumption is small, and energy consumption is small, and it is more suitable for cloud computing systems with huge data and information.


Sign in / Sign up

Export Citation Format

Share Document