data confidentiality
Recently Published Documents


TOTAL DOCUMENTS

352
(FIVE YEARS 132)

H-INDEX

14
(FIVE YEARS 2)

Author(s):  
Ogourinde M. Ogoudjobi ◽  
Patrice D. Dangbemey ◽  
Achille A. A. Obossou ◽  
Abdel S. Saleh ◽  
Fiacre P. D. Hounnouvi ◽  
...  

Background: Uterine rupture is an obstetric disaster and a major concern for the obstetrician in an African environment because of the insufficient technical support. Objective of current study was to study the circumstances of occurrence of uterine ruptures.Methods: The study was carried out at the university clinic of obstetrics and gynecology of CNHU-HKM in Cotonou. This was a descriptive and cross-sectional study with retrospective collection from January 1, 2015 to December 31, 2019. We made an exhaustive recruitment of all the patients treated in the department for uterine rupture during the study period. The study variables were socio-demographic and clinical characteristics. Data confidentiality and the anonymity of women were respected.Results: The study involved 85 cases of uterine rupture. Patients were relatively young with a mean age of 30±15.02 years. Women profile was that of populations with unfavorable socio-economic conditions. The circumstances of discovery were multiparity equal to or greater than 4 (43.5%), scarred uterus (32.9%), non-use of partogram (97.6%), osseous dystocia (10.9%) and fetal dystocia with fetal macrosomia (21.2%) and dystocic presentation (15.3%).Conclusions: This study identified epidemiological and clinical characteristics related to the circumstances of known uterine ruptures occurrence. A preventive and anticipatory oriented approach can reduce the frequency of that obstetric tragedy, the adequate management of which is often uncertain in Benin.


Author(s):  
O. Saber ◽  
T. Mazri

Abstract. A smart city is an urban area based on a variety of services that uses information and communication technologies (ICTs) to improve operational efficiency and citizen's quality of life. It also leans towards meeting the economic, social, environmental, and cultural needs of dwellers. Technologies can add many benefits to smart city to facilitate communication and efficiently manage assets, resources, and services. However, technologies bring new security issues that need to be addressed to ensure data confidentiality, integrity, and availability. This paper provides an overview of the smart city concept by highlighting its main applications and services, presenting some susceptible attacks that can touch the security of applications, and some good practices to ensure the smart city security.


2021 ◽  
Vol 6 (2) ◽  
pp. 54-61
Author(s):  
Lekso Budi Handoko ◽  
Andi Danang Krismawan

The increase in significant advances in information technology greatly provides comfort and convenience in managing data. This convenience is what makes people who are not responsible for using it as a crime such as hacking, cracking, phishing, and so on. In Telkom Region 4 Semarang, there is a container where there are important company data such as customer data. Customer data is very important and the contents of the data must be kept confidential. The company has experienced significant losses due to information leakage due to negligence in the last 5 years. For this reason, data security is necessary so that data is safe and is not misused. This study applies the Advance Encryption Standard algorithm - Cipher Block Chaining (AES-CBC) and Stream cipher in order to secure data so as to reduce the risk of data theft by telecom subscribers. Based on the average avalanche effect value of AES-CBC and a stream cipher of 49.34%, this shows that the AES-CBC and Stream Cipher encrypted files are difficult to crack so that data confidentiality is well maintained.


Patterns ◽  
2021 ◽  
Vol 2 (12) ◽  
pp. 100366
Author(s):  
Amalie Dyda ◽  
Michael Purcell ◽  
Stephanie Curtis ◽  
Emma Field ◽  
Priyanka Pillai ◽  
...  

2021 ◽  
Author(s):  
Shekhar S Kausalye ◽  
Sanjeev Kumar Sharma

In cloud computing security, privacy and data confidentiality plays important role when popularity in terms of cloud computing services is consider. Till now there are various schemes, protocols and architecture for cloud computing privacy and data protection are proposed which are based on data confidentiality, cryptographic solution, cipher text blocks, various transforms, symmetric encryption schemes, attribute-based encryption, trust and reputation, access control, etc., but they are scattered and lacking uniformity without proper security logic. This paper systematically reviews as well as analyze research done in this relevant area. First various shortcomings in cloud computing, architectures, framework and schemes proposed for data confidentiality will be discussed; then existing cryptographic schemes, encryption functions, linear transform, grid storage system, key exposure, secret sharing, AONT (All or Nothing Transform), dispersed storage, trust, block encryption mechanism, attribute-based encryption, access control will be discussed; thirdly propose future direction with research challenges for data confidentiality in cloud computing; finally focus is on concern data confidentiality scheme to overcome the technical deficiency and existing schemes.


2021 ◽  
Vol 10 (3) ◽  
pp. 105-110
Author(s):  
Al Zimy Siregar

In data communication, the aspect of security and confidentiality data is needed. To maintain the security and confidentiality of the data is by using cryptography. Cryptography is the science of mathematical techniques related to aspects of information security such as data confidentiality, data authenticity, data integrity, and authentication data. Text security is done by a hybrid cryptography in a text file that is first performed using ADFGVX Cipher encryption, then the results of ADFGVX Cipher encryption is encrypted using the RSA. Testing primes using the Fermat algorithm. Implementation of the system using C# programming language in Microsoft Visual Studio 2010. The system on RSA was tested with a maximum key length of 256 bits to 32 bits intervals.


2021 ◽  
Vol 12 (02) ◽  
pp. 46-53
Author(s):  
Bobi Akbar

In data communication, against a data security method known as cryptography (Cryptography). Cryptography is a data security method that can be used to maintain data confidentiality, data authenticity or integrity, and the authenticity of the sender. This method is intended so that important information of a limited or confidential nature sent through public telecommunications facilities cannot be known or utilized by unauthorized parties. In this case, data security is also needed at the internet cafe (internet cafe). Warnet which is a place that provides Interconnection Networking that connects computers to form a network system that covers the whole world (global). Each cafe requires a billing system that is used to determine the state of the user in using the facilities at the cafe, starting from how long it takes to use and how much it costs each user. For this reason, so that the data on the billing system cannot be manipulated or modified by unauthorized persons, it is necessary to secure data. The data security method that will be used is cryptography, especially by using the RC4 stream cipher.


2021 ◽  
Author(s):  
Temitope Awodiji

Databases are vulnerable. Public statements by Target, Home Depot, and Anthem following their extremely advertised data breaches are each uniform and succinct on how their breaches unfolded: unauthorized access to those systems that ultimately led to the extraction of sensitive information. A comprehensive strategy to secure a database is over data security. Usually, security events will be related to the later action: illegitimate access to data confidentiality damage, injury to the integrity of knowledge, loss of data accessibility (Discover). Loss of privacy of data, creating them accessible to others without a right of access is not visible within the database and does not need changes deductible database. This paper addresses these events to confirm database security.


2021 ◽  
Vol 11 (21) ◽  
pp. 9792
Author(s):  
Konstantinos Kaltakis ◽  
Panagiota Polyzi ◽  
George Drosatos ◽  
Konstantinos Rantos

Blockchain, a promising technology that has matured and nowadays is widely used in many fields, such as supply chain management, smart grids, agriculture and logistics, has also been proposed for the Internet of Vehicles (IoV) ecosystem to enhance the protection of the data that roadside units and vehicles exchange. Blockchain technology can inherently guarantee the availability, integrity and immutability of data stored in IoV, yet it cannot protect privacy and data confidentiality on its own. As such, solutions that utilise this technology have to consider the adoption of privacy-preserving schemes to address users’ privacy concerns. This paper provides a literature review of proposed solutions that provide different vehicular services using blockchain technology while preserving privacy. In this context, it analyses existing solutions’ main characteristics and properties to provide a comprehensive and critical overview and identifies their contribution in the field. Moreover, it provides suggestions to researchers for future work in the field of privacy-preserving blockchain-enabled solutions for vehicular networks.


2021 ◽  
Vol 2021 ◽  
pp. 1-13
Author(s):  
Mary Subaja Christo ◽  
V. Elizabeth Jesi ◽  
Uma Priyadarsini ◽  
V. Anbarasu ◽  
Hridya Venugopal ◽  
...  

Hospital data management is one of the functional parts of operations to store and access healthcare data. Nowadays, protecting these from hacking is one of the most difficult tasks in the healthcare system. As the user’s data collected in the field of healthcare is very sensitive, adequate security measures have to be taken in this field to protect the networks. To maintain security, an effective encryption technology must be utilised. This paper focuses on implementing the elliptic curve cryptography (ECC) technique, a lightweight authentication approach to share the data effectively. Many researches are in place to share the data wirelessly, among which this work uses Electronic Medical Card (EMC) to store the healthcare data. The work discusses two important data security issues: data authentication and data confidentiality. To ensure data authentication, the proposed system employs a secure mechanism to encrypt and decrypt the data with a 512-bit key. Data confidentiality is ensured by using the Blockchain ledger technique which allows ethical users to access the data. Finally, the encrypted data is stored on the edge device. The edge computing technology is used to store the medical reports within the edge network to access the data in a very fast manner. An authenticated user can decrypt the data and process the data at optimum speed. After processing, the updated data is stored in the Blockchain and in the cloud server. This proposed method ensures secure maintenance and efficient retrieval of medical data and reports.


Sign in / Sign up

Export Citation Format

Share Document