data usability
Recently Published Documents


TOTAL DOCUMENTS

37
(FIVE YEARS 14)

H-INDEX

6
(FIVE YEARS 2)

2021 ◽  
Author(s):  
Israt Jahan Mouri ◽  
Muhammad Ridowan ◽  
Muhammad Abdullah Adnan

Abstract Since more and more data from lightweight platforms like IoT devices are being outsourced to the cloud, the need to ensure privacy while retaining data usability is important. Encrypting documents before uploading to the cloud, ensures privacy but reduces data usability. Searchable encryption, specially public-key searchable encryption (PKSE), allows secure keyword search in the cloud over encrypted documents uploaded from IoT devices. However, most existing PKSE schemes focus on returning all the files that match the queried keyword, which is not practical. To achieve a secure, practical, and efficient keyword search, we design a dynamic ranked PKSE framework over encrypted cloud data named \textit{Secure Public-Key Searchable Encryption} (Se-PKSE). We leverage a partially homomorphically encrypted index tree structure that provides sub-linear ranked search capability and allows dynamic insertion/deletion of documents without the owner storing any document details. An interactive search mechanism is introduced between the user and the cloud to eliminate trapdoors from the search request to ensure search keyword privacy and forward privacy. Finally, we implement a prototype of Se-PKSE and test it in the Amazon EC2 for practicality using the RFC dataset. The comprehensive evaluation demonstrates that Se-PKSE is efficient and secure for practical deployment.


2020 ◽  
Vol 2020 ◽  
pp. 1-10
Author(s):  
Huadong Liu ◽  
Tianlong Gu ◽  
Yining Liu ◽  
Jingcheng Song ◽  
Zhixin Zeng

In smart grids (SG), data aggregation is widely used to strike a balance between data usability and privacy protection. The fault tolerance is an important requirement to improve the robustness of data aggregation protocols, which enables normal execution of the protocols even with failures on some entities. However, to achieve fault tolerance, most schemes either sacrifice the aggregation accuracy due to the use of differential privacy or substitution strategy or need to rely on an online trusted entity to manage all user blinding factors. In this paper, a (k,n) threshold privacy-preserving data aggregation scheme named (k,n)-PDA is proposed, which reconciles data usability and data privacy through the BGN cryptosystem and achieves fault tolerance with accurate aggregation using Shamir’s secret sharing without any online trusted entity. Besides, our scheme supports the efficient changing of users’ membership. Specifically, the dynamic secrete key is distributed to n smart meters (SMs) through the threshold secret sharing algorithm. When k or more meters participate in the aggregation, the data service center (DSC) can reconstruct the key to compute the aggregate results, and less than k SMs cannot recover the key. Thus, our solution still works functionally even if up to n−k SMs fail; also, it resists attacks from the collusion of less than k SMs. Moreover, system and performance analyses demonstrate that our scheme achieves privacy, fault tolerance, and membership dynamics with high efficiency.


Electronics ◽  
2020 ◽  
Vol 9 (7) ◽  
pp. 1093
Author(s):  
Eesa Al Solami ◽  
Muhammad Kamran ◽  
Mohammed Saeed Alkatheiri ◽  
Fouzia Rafiq ◽  
Ahmed S. Alghamdi

The currently-emerging technology demands sharing of data using various channels via the Internet, disks, etc. Some recipients of this data can also become traitors by leaking the important data. As a result, the data breaches due to data leakage are also increasing. These breaches include unauthorized distribution, duplication, and sale. The identification of a guilty agent responsible for such breaches is important for: (i) punishing the culprit; and (ii) preventing the innocent user from accusation and punishment. Fingerprinting techniques provide a mechanism for classifying the guilty agent from multiple recipients and also help to prevent the innocent user from being accused of the data breach. To those ends, in this paper, a novel fingerprinting framework has been proposed using a biometric feature as a digital mark (signature). The use of machine learning has also been introduced to make this framework intelligent, particularly for preserving the data usability. An attack channel has also been used to evaluate the robustness of the proposed scheme. The experimental study was also conducted to demonstrate that the proposed technique is robust against several malicious attacks, such as subset selection attacks, mix and match attacks, collusion attacks, deletion attacks, insertion attacks, and alteration attacks.


2020 ◽  
Author(s):  
Riana Minocher ◽  
Silke Atmaca ◽  
Claudia Bavero ◽  
Richard McElreath ◽  
Bret Beheim

Reproducibility is integral to science, but difficult to achieve. We surveyed 560 empirical publications, published between 1955 and 2018 in the social learning literature, a research topic that spans animal behaviour, behavioural ecology, cultural evolution, and evolutionary psychology. Data was recoverable online or through direct data requests for 30% of this sample. Moreover, data recovery declines exponentially with time since publication, halving every 6 years, and up to every 9 years for human experimental data. When data for a publication can be recovered, we estimate a high probability of subsequent data usability (87%), analytical clarity (97%), and agreement of published results with reproduced findings (96%). This corresponds to an overall rate of recovering data and reproducing results of 23%, largely driven by unavailability or incompleteness of data. We thus outline clear measures to improve reproducibility of research on the ecology and evolution of social behaviour.


Author(s):  
Kristin Shrader-Frechette ◽  
Andrew M. Biondo

Nearly 25 percent of US children live within 2 km of toxic-waste sites, most of which are in urban areas. They face higher rates of cancer than adults, partly because the dominant contaminants at most US hazardous-waste sites include genotoxic carcinogens, like trichloroethylene, that are much more harmful to children. The purpose of this article is to help protect the public, especially children, from these threats and to improve toxics-remediation by beginning to test our hypothesis: If site-remediation assessments fail data-usability evaluation (DUE), they likely compromise later cleanups and public health, especially children’s health. To begin hypothesis-testing, we perform a focused DUE for an unremediated, Pasadena, California toxic site. Our DUE methods are (a) comparing project-specific, remediation-assessment data with the remediation-assessment conceptual site model (CSM), in order to identify data gaps, and (b) using data-gap directionality to assess possible determinate bias (whether reported toxics risks are lower/higher than true values). Our results reveal (1) major CSM data gaps, particularly regarding Pasadena-toxic-site risks to children; (2) determinate bias, namely, risk underestimation; thus (3) likely inadequate remediation. Our discussion shows that if these results are generalizable, requiring routine, independent, DUEs might deter flawed toxic-site assessment/cleanup and resulting health threats, especially to children.


2020 ◽  
Vol 11 (1) ◽  
pp. 739-748 ◽  
Author(s):  
Ian Kosen ◽  
Can Huang ◽  
Zhi Chen ◽  
Xuechen Zhang ◽  
Liang Min ◽  
...  

Author(s):  
Steffen Baumann ◽  
Richard Stone ◽  
Esra Abdelall ◽  
Varun Srikrishnan ◽  
Thomas Schnieders ◽  
...  

The adoption of blockchain shows a variety of benefits owing to an incorruptible digital ledger and a decentralized database. This has eliminated the need for a gatekeeper to oversee all associated transactions. Blockchain, the underlying technology behind Bitcoin and other crypto-currencies, has found use in many industries besides finance, such as healthcare, where it is used for verifying medical licensing and credentialing, for tracking medical equipment (or consumables) from production to usage, and in cases associated with high levels of privacy and security. Patient data is collected using a plethora of patient-generated data devices, such as Internet of Things (IoT)-enabled wearables, health trackers, and home use medical devices. As a result, the data is siloed amongst several applications and/or vendors’ proprietary solutions. Of all this data, only some of it is transmitted to Electronic Medical Records. This produces the risk that not all data collected will be reviewed at the point of care due to the abundance of data collected. This article explains the areas within healthcare where blockchain could address data usability challenges and analyzes new ways in which patient health data can be collected to address the increasing number of challenges associated with the amount of data being generated over time. It also describes the drivers behind this data collection trend, the associated challenges and the subsequent ramifications. It concludes with a review of previous studies on data usability challenges and the means by which blockchain can be used to overcome these challenges.


Author(s):  
Wenjing Guo ◽  
Jeffrey Archer ◽  
Morgan Moore ◽  
Jeffrey Bruce ◽  
Michelle McLain ◽  
...  

Persistent organic pollutants (POPs) cause a significant public and environmental health concern due to their toxicity, long-range transportability, persistence, and bioaccumulation. The US Food and Drug Administration (FDA) has a program to monitor POPs in human and animal foods at ultra-trace levels, using gas chromatography coupled with mass spectrometry (GC–MS). Stringent quality control procedures are practiced within this program, ensuring the reliability and accuracy of these POP results. Due to the complexity of this program’s quality control (QC), the decision-making process for data usability was very time-consuming, upward of three analyst hours for a batch of six extracts. We significantly reduced this time by developing a software kit, written in Python, to evaluate instrument and sample QC, along with data usability. A diverse set of 45 samples were tested using our software, QUICK (Quality and Usability Investigation and Control Kit), that resulted in equivalent results provided by a human reviewer. The software improved the efficiency of the analytical process by reducing the need for user intervention, while simultaneously recognizing a 95% decrease in data reduction time, from 3 hours to 10 minutes.


Sign in / Sign up

Export Citation Format

Share Document