data access
Recently Published Documents


TOTAL DOCUMENTS

3699
(FIVE YEARS 1323)

H-INDEX

51
(FIVE YEARS 10)

2022 ◽  
Vol 14 (2) ◽  
pp. 398
Author(s):  
Pieter Kempeneers ◽  
Tomas Kliment ◽  
Luca Marletta ◽  
Pierre Soille

This paper is on the optimization of computing resources to process geospatial image data in a cloud computing infrastructure. Parallelization was tested by combining two different strategies: image tiling and multi-threading. The objective here was to get insight on the optimal use of available processing resources in order to minimize the processing time. Maximum speedup was obtained when combining tiling and multi-threading techniques. Both techniques are complementary, but a trade-off also exists. Speedup is improved with tiling, as parts of the image can run in parallel. But reading part of the image introduces an overhead and increases the relative part of the program that can only run in serial. This limits speedup that can be achieved via multi-threading. The optimal strategy of tiling and multi-threading that maximizes speedup depends on the scale of the application (global or local processing area), the implementation of the algorithm (processing libraries), and on the available computing resources (amount of memory and cores). A medium-sized virtual server that has been obtained from a cloud service provider has rather limited computing resources. Tiling will not only improve speedup but can be necessary to reduce the memory footprint. However, a tiling scheme with many small tiles increases overhead and can introduce extra latency due to queued tiles that are waiting to be processed. In a high-throughput computing cluster with hundreds of physical processing cores, more tiles can be processed in parallel, and the optimal strategy will be different. A quantitative assessment of the speedup was performed in this study, based on a number of experiments for different computing environments. The potential and limitations of parallel processing by tiling and multi-threading were hereby assessed. Experiments were based on an implementation that relies on an application programming interface (API) abstracting any platform-specific details, such as those related to data access.


Semantic Web ◽  
2022 ◽  
pp. 1-24
Author(s):  
Marlene Goncalves ◽  
David Chaves-Fraga ◽  
Oscar Corcho

With the increase of data volume in heterogeneous datasets that are being published following Open Data initiatives, new operators are necessary to help users to find the subset of data that best satisfies their preference criteria. Quantitative approaches such as top-k queries may not be the most appropriate approaches as they require the user to assign weights that may not be known beforehand to a scoring function. Unlike the quantitative approach, under the qualitative approach, which includes the well-known skyline, preference criteria are more intuitive in certain cases and can be expressed more naturally. In this paper, we address the problem of evaluating SPARQL qualitative preference queries over an Ontology-Based Data Access (OBDA) approach, which provides uniform access over multiple and heterogeneous data sources. Our main contribution is Morph-Skyline++, a framework for processing SPARQL qualitative preferences by directly querying relational databases. Our framework implements a technique that translates SPARQL qualitative preference queries directly into queries that can be evaluated by a relational database management system. We evaluate our approach over different scenarios, reporting the effects of data distribution, data size, and query complexity on the performance of our proposed technique in comparison with state-of-the-art techniques. Obtained results suggest that the execution time can be reduced by up to two orders of magnitude in comparison to current techniques scaling up to larger datasets while identifying precisely the result set.


Sensors ◽  
2022 ◽  
Vol 22 (2) ◽  
pp. 572
Author(s):  
Aitizaz Ali ◽  
Mohammed Amin Almaiah ◽  
Fahima Hajjej ◽  
Muhammad Fermi Pasha ◽  
Ong Huey Fang ◽  
...  

The IoT refers to the interconnection of things to the physical network that is embedded with software, sensors, and other devices to exchange information from one device to the other. The interconnection of devices means there is the possibility of challenges such as security, trustworthiness, reliability, confidentiality, and so on. To address these issues, we have proposed a novel group theory (GT)-based binary spring search (BSS) algorithm which consists of a hybrid deep neural network approach. The proposed approach effectively detects the intrusion within the IoT network. Initially, the privacy-preserving technology was implemented using a blockchain-based methodology. Security of patient health records (PHR) is the most critical aspect of cryptography over the Internet due to its value and importance, preferably in the Internet of Medical Things (IoMT). Search keywords access mechanism is one of the typical approaches used to access PHR from a database, but it is susceptible to various security vulnerabilities. Although blockchain-enabled healthcare systems provide security, it may lead to some loopholes in the existing state of the art. In literature, blockchain-enabled frameworks have been presented to resolve those issues. However, these methods have primarily focused on data storage and blockchain is used as a database. In this paper, blockchain as a distributed database is proposed with a homomorphic encryption technique to ensure a secure search and keywords-based access to the database. Additionally, the proposed approach provides a secure key revocation mechanism and updates various policies accordingly. As a result, a secure patient healthcare data access scheme is devised, which integrates blockchain and trust chain to fulfill the efficiency and security issues in the current schemes for sharing both types of digital healthcare data. Hence, our proposed approach provides more security, efficiency, and transparency with cost-effectiveness. We performed our simulations based on the blockchain-based tool Hyperledger Fabric and OrigionLab for analysis and evaluation. We compared our proposed results with the benchmark models, respectively. Our comparative analysis justifies that our proposed framework provides better security and searchable mechanism for the healthcare system.


2022 ◽  
Vol 3 ◽  
Author(s):  
Pei-Yao Hung ◽  
Drew Canada ◽  
Michelle A. Meade ◽  
Mark S. Ackerman

Chronic health conditions are becoming increasingly prevalent. As part of chronic care, sharing patient-generated health data (PGHD) is likely to play a prominent role. Sharing PGHD is increasingly recognized as potentially useful for not only monitoring health conditions but for informing and supporting collaboration with caregivers and healthcare providers. In this paper, we describe a new design for the fine-grained control over sharing one's PGHD to support collaborative self-care, one that centers on giving people with health conditions control over their own data. The system, Data Checkers (DC), uses a grid-based interface and a preview feature to provide users with the ability to control data access and dissemination. DC is of particular use in the case of severe chronic conditions, such as spinal cord injuries and disorders (SCI/D), that require not just intermittent involvement of healthcare providers but daily support and assistance from caregivers. In this paper, after providing relevant background information, we articulate our steps for developing this innovative system for sharing PGHD including (a) use of a co-design process; (b) identification of design requirements; and (c) creation of the DC System. We then present a qualitative evaluation of DC to show how DC satisfied these design requirements in a way that provided advantages for care. Our work extends existing research in the areas of Human-Computer Interaction (HCI), Computer-Supported Cooperative Work (CSCW), Ubiquitous Computing (Ubicomp), and Health Informatics about sharing data and PGHD.


2022 ◽  
Vol 80 (1) ◽  
Author(s):  
Brigid Unim ◽  
Elsi Haverinen ◽  
Eugenio Mattei ◽  
Flavia Carle ◽  
Andrea Faragalli ◽  
...  

Abstract Background Research networks offer multidisciplinary expertise and promote information exchange between researchers across Europe. They are essential for the European Union’s (EU) health information system as providers of health information and data. The aim of this mapping exercise was to identify and analyze EU research networks in terms of health data collection methods, quality assessment, availability and accessibility procedures. Methods A web-based search was performed to identify EU research networks that are not part of international organizations (e.g., WHO-Europe, OECD) and are involved in collection of data for health monitoring or health system performance assessment. General characteristics of the research networks (e.g., data sources, representativeness), quality assessment procedures, availability and accessibility of health data were collected through an ad hoc extraction form. Results Fifty-seven research networks, representative at national, international or regional level, were identified. In these networks, data are mainly collected through administrative sources, health surveys and cohort studies. Over 70% of networks provide information on quality assessment of their data collection procedures. Most networks share macrodata through articles and reports, while microdata are available from ten networks. A request for data access is required by 14 networks, of which three apply a financial charge. Few networks share data with other research networks (8/49) or specify the metadata-reporting standards used for data description (9/49). Conclusions Improving health information and availability of high quality data is a priority in Europe. Research networks could play a major role in tackling health data and information inequalities by enhancing quality, availability, and accessibility of health data and data sharing across European networks.


Author(s):  
Xianfei Zhou ◽  
Hongfang Cheng ◽  
Fulong Chen

Cross-border payment optimization technology based on block chain has become a hot spot in the industry. The traditional method mainly includes the block feature detection method, the fuzzy access method, the adaptive scheduling method, which perform related feature extraction and quantitative regression analysis on the collected distributed network connection access data, and combine the fuzzy clustering method to optimize the data access design, and realize the group detection and identification of data in the block chain. However, the traditional method has a large computational overhead for distributed network connection access, and the packet detection capability is not good. This paper constructs a statistical sequence model of adaptive connection access data to extract the descriptive statistical features of the distributed network block chain adaptive connection access data similarity. The performance of the strategy retrieval efficiency in the experiment is tested based on the strategy management method. The experiment performs matching query tests on the test sets of different query sizes. The different parameters for error rate and search delay test are set to evaluate the impact of different parameters on retrieval performance. The calculation method of single delay is the total delay or the total number of matches. The optimization effect is mainly measured by the retrieval delay of the strategy in the strategy management contract; the smaller the delay, the higher the execution efficiency, and the better the retrieval optimization effect.


Electronics ◽  
2022 ◽  
Vol 11 (1) ◽  
pp. 167
Author(s):  
Yong Zhu ◽  
Xiao Wu ◽  
Zhihui Hu

Traditional centralized access control faces data security and privacy problems. The core server is the main target to attack. Single point of failure risk and load bottleneck are difficult to solve effectively. And the third-party data center cannot protect data owners. Traditional distributed access control faces the problem of how to effectively solve the scalability and diversified requirements of IoT (Internet of Things) applications. SCAC (Smart Contract-based Access Control) is based on ABAC (Attributes Based Access Control) and RBAC (Role Based Access Control). It can be applied to various types of nodes in different application scenarios that attributes are used as basic decision elements and authorized by role. The research objective is to combine the efficiency of service orchestration in edge computing with the security of consensus mechanism in blockchain, making full use of smart contract programmability to explore fine grained access control mode on the basis of traditional access control paradigm. By designing SSH-based interface for edge computing and blockchain access, SCAC parameters can be found and set to adjust ACLs (Access Control List) and their policies. The blockchain-edge computing combination is powerful in causing significant transformations across several industries, paving the way for new business models and novel decentralized applications. The rationality on typical process behavior of management services and data access control be verified through CPN (Color Petri Net) tools 4.0, and then data statistics on fine grained access control, decentralized scalability, and lightweight deployment can be obtained by instance running in this study. The results show that authorization takes into account both security and efficiency with the “blockchain-edge computing” combination.


Author(s):  
Jiawei Zhang ◽  
Teng Li ◽  
Qi Jiang ◽  
Jianfeng Ma

AbstractWith the assistance of emerging techniques, such as cloud computing, fog computing and Internet of Things (IoT), smart city is developing rapidly into a novel and well-accepted service pattern these days. The trend also facilitates numerous relevant applications, e.g., smart health care, smart office, smart campus, etc., and drives the urgent demand for data sharing. However, this brings many concerns on data security as there is more private and sensitive information contained in the data of smart city applications. It may incur disastrous consequences if the shared data are illegally accessed, which necessitates an efficient data access control scheme for data sharing in smart city applications with resource-poor user terminals. To this end, we proposes an efficient traceable and revocable time-based CP-ABE (TR-TABE) scheme which can achieve time-based and fine-grained data access control over large attribute universe for data sharing in large-scale smart city applications. To trace and punish the malicious users that intentionally leak their keys to pursue illicit profits, we design an efficient user tracing and revocation mechanism with forward and backward security. For efficiency improvement, we integrate outsourced decryption and verify the correctness of its result. The proposed scheme is proved secure with formal security proof and is demonstrated to be practical for data sharing in smart city applications with extensive performance evaluation.


Electronics ◽  
2022 ◽  
Vol 11 (1) ◽  
pp. 137
Author(s):  
Abdul Razaque ◽  
Nazerke Shaldanbayeva ◽  
Bandar Alotaibi ◽  
Munif Alotaibi ◽  
Akhmetov Murat ◽  
...  

Nowadays, cloud computing is one of the important and rapidly growing services; its capabilities and applications have been extended to various areas of life. Cloud computing systems face many security issues, such as scalability, integrity, confidentiality, unauthorized access, etc. An illegitimate intruder may gain access to a sensitive cloud computing system and use the data for inappropriate purposes, which may lead to losses in business or system damage. This paper proposes a hybrid unauthorized data handling (HUDH) scheme for big data in cloud computing. The HUDH scheme aims to restrict illegitimate users from accessing the cloud and to provide data security provisions. The proposed HUDH consists of three steps: data encryption, data access, and intrusion detection. The HUDH scheme involves three algorithms: advanced encryption standards (AES) for encryption, attribute-based access control (ABAC) for data access control, and hybrid intrusion detection (HID) for unauthorized access detection. The proposed scheme is implemented using the Python and Java languages. The testing results demonstrated that the HUDH scheme can delegate computation overhead to powerful cloud servers. User confidentiality, access privilege, and user secret key accountability can be attained with more than 97% accuracy.


Sign in / Sign up

Export Citation Format

Share Document