6 research outputs found

    A Study on Data Protection in Cloud Environment

    Get PDF
    Data protection in the online environment pertains to the safeguarding of sensitive or important data kept, analyzed, or sent in cloud-based systems. It entails assuring data confidentiality, integrity, and availability, as well as adhering to appropriate data protection requirements. In a nutshell, cloud data protection seeks to protect data against unauthorized access, deletion, or breaches while retaining its accuracy and accessible to authorized users. This is accomplished in the cloud environment using various security measures, encryption approaches, access controls, disaster recovery and backup processes, and constant monitoring and threat detection.  The research significance of data protection in the cloud environment can be summarized as follows: Security and Privacy: Research in data protection in the cloud helps address the security and privacy concerns associated with storing and processing sensitive data in cloud-based systems. It explores and develops advanced security mechanisms, encryption techniques, and access controls to protect data from unauthorized access, data breaches, and privacy violations. Trust and Confidence: Research in data protection contributes to building trust and confidence in cloud computing. By developing robust security solutions and demonstrating their effectiveness, research helps alleviate concerns about data security and privacy, fostering greater adoption of cloud services by organizations and individuals. Compliance and Regulations: Cloud computing often involves compliance with data protection regulations and industry standards. Research in this area explores the legal and regulatory aspects of data protection in the cloud and helps organizations understand and comply with relevant requirements. Data Resilience and Recovery: Research in data protection focuses on ensuring data resilience and developing efficient data recovery mechanisms in the cloud. It explores backup and disaster recovery strategies, data replication techniques, and data loss prevention methods to minimize downtime, recover data promptly, and maintain business continuity in the event of system failures or disasters. By addressing these research areas, studies on data protection in the cloud environment contribute to enhancing security, privacy, compliance, and resilience in cloud computing. They provide valuable insights, practical solutions, and guidelines for organizations and service providers to protect data effectively and maintain the trust of users in cloud-based services. The weighted product method approach is commonly used to choose the best data protection in cloud environment. CCSS1, CCSS2, CCSS3, CCSS4, CCSS5 data visibility, data integrity, Maintains compliance, Data security, Data storage. From the result it is seen that CCSS2 got highest rank whereas CCSS5 got lowest rank According to the results, CCSS2 was ranked first

    Digital Rights Management - Current Status and Future Trends

    Get PDF

    A COMPREHENSIVE STUDY OF CRYPTOGRAPHY AND KEY MANAGEMENT BASED SECURITY IN CLOUD COMPUTING

    Get PDF
    Cloud computing is a cost effective flexible and proven delivery platform for providing consumer IT services or business services over internet. It has an ability to provide many services over internet. It not only provides computing services but additional computing resources. To interact with various services in the cloud and to store retrieve data from cloud several security mechanism is required. Cryptography and key management mechanism are one of the import services in the cloud to secure data. In this context, this paper investigates the basic problem of cloud computing with cryptography and key management system for enabling support of interoperability between cloud cryptography client and key management services

    Digital Copyright Protection: Focus on Some Relevant Solutions

    Get PDF
    Copyright protection of digital content is considered a relevant problem of the current Internet since content digitalization and high performance interconnection networks have greatly increased the possibilities to reproduce and distribute digital content. Digital Rights Management (DRM) systems try to prevent the inappropriate or illegal use of copyrighted digital content. They are promoted by the major global media players, but they are also perceived as proprietary solutions that give rise to classic problems of privacy and fair use. On the other hand, watermarking protocols have become a possible solution to the problem of copyright protection. They have evolved during the last decade, and interesting proposals have been designed. This paper first presents current trends concerning the most significant solutions to the problem of copyright protection based on DRM systems and then focuses on the most promising approaches in the field of watermarking protocols. In this regard, the examined protocols are discussed in order to individuate which of them can better represent the right trade-off between opposite goals, such as, for example, security and easy of use, so as to prove that it is possible to implement open solutions compatible with the current web context without resorting to proprietary architectures or impairing the protection of copyrighted digital content

    Verteilte Nutzungskontrolle und Provenance Tracking am Beispiel von Cloud-Technologien

    Get PDF
    In den letzten Jahrzehnten haben sich Daten zu einem der wertvollsten Rohstoffe entwickelt. Im Zuge dessen werden Forderungen nach einem transparenten und kontrollierbaren Umgang mit Daten immer lauter. Nutzungskontrolle und Provenance Tracking sind Konzepte, mit denen diese Forderungen umgesetzt werden können. Nutzungskontrolle ergänzt hierzu die Zugriffskontrolle um den Umstand, dass die Nutzung von Daten – auch nachdem sie verbreitet wurden – kontrolliert werden kann. Provenance Tracking dient hingegen zur Bestimmung der Herkunft eines Datums. Das für Nutzungskontrolle und Provenance Tracking notwendige Fundament – die Infrastruktur - könnte hierbei durch Cloud-Technologien, wie Kubernetes, bereitgestellt werden. Dahingehend bietet diese Arbeit einen Überblick über den aktuellen Forschungsstand zu Nutzungskontrolle und Provenance Tracking. Dies umfasst insbesondere mögliche Bezüge zum Themengebiet Cloud Computing und aktuelle Forschungsprojekte, wie International Data Spaces (IDS) und deren Referenzarchitektur. Des Weiteren wird ein grundlegendes Verständnis für den Begriff Cloud geschaffen. Im Besonderen wird auf die Aspekte Sicherheit und Recht im Kontext von Cloud Computing eingegangen. Schlussendlich werden die dadurch gewonnen Erkenntnisse zur Ausbringung einer prototypischen Nutzungskontroll- sowie Provenance sammelnden Infrastruktur genutzt. Die Cloud-Technologie Kubernetes sowie hierfür entwickelte Dummy-Komponenten der Referenzarchitektur bilden das Fundament dieser Infrastruktur. Die Modellierung und Implementierung ist daraufhin Gegenstand einer Evaluation und Diskussion mit Fokus auf operativen und sicherheitsrelevanten Aspekten

    Gestão de informações médicas em unidades básicas de saúde : análise de um caso real e proposta de um modelo de controle de uso de informações médicas sensível ao contexto

    Get PDF
    Orientador : Carlos Alberto MazieroTese (doutorado) - Universidade Federal do Paraná, Setor de Ciências Exatas, Programa de Pós-Graduação em Informática. Defesa: Curitiba, 31/07/2017Inclui referências : f. 111-117Área de concentração : Ciência da computaçãoResumo: No Brasil, o Setor Primário de atendimento de saúde que corresponde às Unidades Básicas de Saúde - UBS, estão, atualmente, em processo de evolução digital. Os prontuários Eletrônicos - PE são direcionados apenas para vacinas e exames e os demais procedimentos e atendimentos são registrados em prontuários de papel. Contudo, os PE carecem de tecnologias de autorização de acesso, ou seja, recursos computacionais que possam determinar qual usuário poderá acessar o PE do paciente e por quanto tempo. A partir destas informações, o objetivo desta tese foi desenvolver um modelo de controle de acesso sensível ao contexto que faça o processamento das requisições de autorizações para o uso controlado do PE. Para este estudo, foram pesquisados os ambientes de saúde das UBS, através de pesquisa qualitativa; averiguação da legislação acerca de prontuários em saúde; levantamento de conceitos do modelo de controle de uso UCONabc, e da aplicação das informações contextuais, bem como a compreensão da aplicação destes conceitos através da linguagem XACML. Em seguida foram elaborados os requisitos do modelo, a sua modelagem conceitual, e a sua implementação prática através do desenvolvimento de um protótipo. Os resultados mostraram (i) que os usuários (equipe multidisciplinar e administrativa) das UBS, possuem acesso liberado aos PE e em papel dos pacientes; (ii) que há dificuldade de compartilhamento das informações dos prontuários entre as UBS; (iii) que o armazenamento dos prontuários em papel é vulnerável; (iv) que as políticas de regras desenvolvidas processaram corretamente as requisições de autorizações; (v) que através das políticas de regras é possível a implementação da delegação de direitos de uso; (vi) que a utilização do PE pode ser controlado por tempo; (vii) que as informações contextuais podem ser aplicadas nesse processo; (viii) e que o desempenho do modelo proposto quando utilizado apenas um servidor para sua hospedagem e processamento apresentam resultado satisfatório. Com isto, conclui-se que o Setor Primário de atendimento em saúde necessita de uma ampliação do uso de PE, abrangendo o registro de todos os procedimentos realizados e a aplicação das tecnologias de controle de acesso. Conforme sugerido no modelo de controle de uso sensível ao contexto para prontuário eletrônico. Palavras-chave: Controle de Acesso, Informação Contextual, Prontuário Eletrônico, Unidades Básicas de Saúde.Abstract: In Brazil, the Primary Sector of health care that corresponds to the Basic Health Units - UBS, are currently in the process of digital evolution. Electronic records - PE are directed only to vaccines and exams and the other procedures and appointments are recorded in paper charts. However, PEs lack access authorization technologies, that is, computational resources that can determine which user can access the patient's PE and for how long. From this information, the purpose of this thesis was to develop a context sensitive access control model that will process the requisitions of authorizations for the controlled use of the EP. For this study, the health environments of the UBS were searched through qualitative research; verification of legislation on health records; a survey of concepts of the UCONabc use control model, and the application of contextual information, as well as the understanding of the application of these concepts through the XACML language. Next, the requirements of the model, its conceptual modeling, and its practical implementation through the development of a prototype were elaborated. The results showed that the users (multidisciplinary and administrative team) of the BHUs have access to the PEs and on paper of the patients; (ii) that there is difficulty in sharing the information of the medical records between the UBS; (iii) that the storage of medical records is vulnerable; (iv) that the rule rules developed correctly processed the requisitions of authorizations; (v) that through the rules policies it is possible to implement the delegation of rights of use; (vi) that the use of PE can be time controlled; (vii) that contextual information can be applied in this process; (viii) and that the performance of the proposed model when using only one server for its hosting and processing presents satisfactory results. With this, it is concluded that the Primary Sector of health care needs an extension of the use of PE, covering the registration of all the procedures performed and the application of access control. As suggested in the context-sensitive use control model for electronic medical records. Keywords: Usage Control, Context Aware, Electronic Medical Record, Basic Healthcare Unit
    corecore