16 research outputs found

    A New Algorithm Technique for Protection Secure Personal Key and Cloud Storage

    Get PDF
    Abstract People can only enjoy the completed advantages over astronaut computing condition we may address the entirely actual privateness or safety concerns that arrive with storing touchy private facts into databases and applications measure around the Internet. Cloud computing is the class of a computing rule the place the enormous dynamic up to expectation IT helps as like a "service" the usage of pc and web applied sciences is transferred in imitation of much out of doors customers. The proposed method offers three-level protection the usage of AES algorithm and a secure personal key. The approach also provides data tankage privateness safety because of huge groups yet the discovery about sensitive facts tankage leaks. Our order gives some on the privateness practices ancient within wind computing services

    Distributed File Sharing and Retrieval Model for Cloud Virtual Environment

    Get PDF
    Cloud-based storage services are multiplying and are being adapted mostly for data storage. At the same time, many potential problems pertaining to data storage and security are being addressed. This research provides the architecture for splitting user data and the solution in retrieving different data chunks, stored on different cloud storages. By doing this, not only the load on a single server is reduced but security and storage are efficiently used. Data would be stored and retrieved in slices, hence the chances of data forgery are diminishing. File processing will be faster as split parts would be fetched from different clouds, enabling parallel processing

    Security aspects in healthcare information systems: A systematic mapping

    Get PDF
    The security of patientโ€™s data is the most overbearing barrier to access when considering the adoption of Healthcare Information Systems (HIS) in the healthcare industry. Recently, several studies were conducted to address security risks, and a series of solutions were proposed to enable data and privacy protection. In this paper we conduct the systematic mapping review to know more about security aspects in HIS. Our study provides a comprehensive review of the literature on the evaluation and implementation of HIS security, detailing the challenges and recommendations for implementers and adopters alike. The purpose of this paper is to analyse the security perspective and some of the important concerns that need to be considered to successfully use information systems in healthcare.publishedVersio

    Privacy-Aware Architectures for NFC and RFID Sensors in Healthcare Applications

    Get PDF
    World population and life expectancy have increased steadily in recent years, raising issues regarding access to medical treatments and related expenses. Through last-generation medical sensors, NFC (Near Field Communication) and radio frequency identification (RFID) technologies can enable healthcare internet of things (H-IoT) systems to improve the quality of care while reducing costs. Moreover, the adoption of point-of-care (PoC) testing, performed whenever care is needed to return prompt feedback to the patient, can generate great synergy with NFC/RFID H-IoT systems. However, medical data are extremely sensitive and require careful management and storage to protect patients from malicious actors, so secure system architectures must be conceived for real scenarios. Existing studies do not analyze the security of raw data from the radiofrequency link to cloud-based sharing. Therefore, two novel cloud-based system architectures for data collected from NFC/RFID medical sensors are proposed in this paper. Privacy during data collection is ensured using a set of classical countermeasures selected based on the scientific literature. Then, data can be shared with the medical team using one of two architectures: in the first one, the medical system manages all data accesses, whereas in the second one, the patient defines the access policies. Comprehensive analysis of the H-IoT system can be useful for fostering research on the security of wearable wireless sensors. Moreover, the proposed architectures can be implemented for deploying and testing NFC/RFID-based healthcare applications, such as, for instance, domestic PoCs

    Cloud-based Platform for Collaborative Business Process Management

    Get PDF
    With the wide adoption of the Internet, organizations establish collaborative networks to execute Collaborative Business Processes (CBPs). Current approaches of Process-Aware Information Systems (PAISs) to implement and execute CBPs have shortcomings: high costs and complexity of IT infrastructure to deploy the PAISs; poor support for autonomy, decentralization, global view of message exchange and peer-to-peer interactions; and rigid platforms for generating and deploying PAISs on-demand according with the CBPs agreed in collaborative networks. To overcome these issues, this work proposes a cloud-based platform for the management of CBPs. The platform provides cloud services that enable the generation and deployment on-demand of the PAISs required to implement the agreed CBPs, as well as the execution on-demand of CBPs by fulfilling the abovementioned issues. To deal with privacy issues, the platform can be deployed in private clouds. Elasticity is provided at the level of process instances and portability is also achieved.Sociedad Argentina de Informรกtica e Investigaciรณn Operativa (SADIO

    Implementation of Google Home voice assistant

    Get PDF
    Cieฤพom bakalรกrskej prรกce bolo priblรญลพiลฅ problematiku inteligentnรฝch zariadenรญ, s nimi spojenรฝch technolรณgiรญ a implementรกcia hlasovรฉho asistenta Google Assistant v zariadenรญ Raspberry Pi 3. ฤŽalej je v prรกci popรญsanรฝ vรฝvoj aplikรกcie pre hlasovรฉho asistenta Google Assistant a tieลพ moลพnosti a spรดsob fungovania platformy Dialogflow. Prรกca je aplikaฤnรฉho charakteru, ลกtruktรบrovanรก do dvoch ฤasti. V teoretickej ฤasti autor pribliลพuje problematiku Internetu vecรญ a komunikรกcie dvoch zariadenรญ, ako aj popisuje domรกcich asistentov dostupnรฝch na trhu spolu s ich vlastnosลฅami a spรดsobom ฤinnosti platformy Dialogflow. Praktickรก ฤasลฅ ponรบka nรกhฤพad na autorom vybranรฝ spรดsob implementรกcie hlasovรฉho asistenta Google Assistant v zariadenรญ Raspberry Pi 3, ktorรฝ je rozลกรญrenรฝ o implementรกciu vlastnej aplikรกcie. V predloลพenej prรกci je tieลพ uvedenรฝ postup vytvorenia domรกcej meteostanice a programu na jej ovlรกdanie.The main goal of this bachelor thesis was to investigate the smart devices field together with technologies linked to it. Further, it describes the implementation of Google Assistant to Raspberry Pi 3 and options of controlling it via the Dialogflow platform. The thesis provides hands-on experience and is structured into two parts. The first, theoretical section focuses on Internet of Things and Device to Device communication. It also describes currently available smart home assistants and their functionalities. The thesis also describes the Dialogflow platform together with it's functionalities and options of it's use. The practical part of this thesis describes implementation of the Google Assistant in Raspberry Pi 3, development and integration of application created for it and the creation of home weather station.

    Repeatable Oblivious Shuffling of Large Outsourced Data Blocks

    Get PDF
    As data outsourcing becomes popular, oblivious algorithms have raised extensive attentions since their control flow and data access pattern appear to be independent of the input data they compute on and thus are especially suitable for secure processing in outsourced environments. In this work, we focus on oblivious shuffling algorithms that aim to shuffle encrypted data blocks outsourced to the cloud server without disclosing the permutation of blocks to the server. Existing oblivious shuffling algorithms suffer from issues of heavy communication and client computation costs when blocks have a large size because all outsourced blocks must be downloaded to the client for shuffling or peeling off extra encryption layers. To help eliminate this void, we introduce the ``repeatable oblivious shuffling\u27\u27 notation that restricts the communication and client computation costs to be independent of the block size. We present an efficient construction of repeatable oblivious shuffling using additively homomorphic encryption schemes. The comprehensive evaluation of our construction shows its effective usability in practice for shuffling large-sized blocks

    ํƒ„์ž๋‹ˆ์•„ ์ „์ž์ •๋ถ€ ์‚ฌ์šฉ์ž์˜ ๋งŒ์กฑ๋„ ๋ถ„์„

    Get PDF
    ํ•™์œ„๋…ผ๋ฌธ(์„์‚ฌ) -- ์„œ์šธ๋Œ€ํ•™๊ต๋Œ€ํ•™์› : ํ–‰์ •๋Œ€ํ•™์› ํ–‰์ •ํ•™๊ณผ, 2023. 2. Seok-Jin Eom.E-Government users satisfaction is an important factor for users to continue using E-Government Systems. Many countries, developed and developed ones, have been using E-Government services with the intention of transforming public service institutions and public services delivery. Governments have been investing heavily in E-Government so as to deliver quality services, engaging the community and stakeholders in decision making process and with the intention of minimizing corruption. There still remains the question of what factors really influence e-Government users satisfaction. This study aims to examine factors influencing E-Government users satisfaction, by using the E-Office Management System at the Judiciary of Tanzania as the case study. Basing on available literature on the field of e-Government, four independent variables that may influence E-Office Management System users satisfaction are examined in this study. Identified independent variables for this study are System Quality, Information Quality, Service Quality and Security and Privacy. Furthermore, Gender, Age, Level of Education, Working Experience, Job Position and Frequency of Using E-Office Management System are used as control variables of this study. From four independent variables, four hypotheses were formulated in this study. Survey data from 112 employees of the Judiciary of Tanzania who have access to e-Office Management System were collected and used to test four hypotheses of the study. IBM SPSS Statistics software was used to analyze data collected from the respondents of this study. Findings show that Information Quality and Security and Privacy positively influence e-Office Management System users satisfaction. However, this study did not confirm if System Quality and Service Quality have a positive influence on E-Office Management System users satisfaction. Moreover, all control variables were not confirmed to have any positive influence on users satisfaction. The findings of this study provide some insights to decision makers to keep into consideration factors that positively influence E-Government users satisfaction, and calls for more research to be conducted on effects of service quality and system quality on e-government users satisfaction. Keywords: System Quality, Information Quality, Service Quality, Security and Privacy, and e-government users satisfaction. Student Number: 2021-28985์ „์ž์ •๋ถ€ ์‚ฌ์šฉ์ž์˜ ๋งŒ์กฑ๋„๋Š” ์‚ฌ์šฉ์ž๊ฐ€ ์ „์ž์ •๋ถ€ ์‹œ์Šคํ…œ์„ ์ง€์†์ ์œผ๋กœ ์‚ฌ์šฉํ•˜๊ธฐ ์œ„ํ•œ ์ค‘์š”ํ•œ ์š”์†Œ์ด๋‹ค. ์„ ์ง„๊ตญ์„ ๋ง‰๋ก ํ•œ ๋งŽ์€ ๊ตญ๊ฐ€๋“ค์ด ๊ณต๊ณต์„œ๋น„์Šค ๊ธฐ๊ด€๊ณผ ๊ณต๊ณต์„œ๋น„์Šค ์ œ๊ณต์„ ์ „ํ™˜ํ•˜๋ ค๋Š” ์˜๋„๋กœ ์ „์ž์ •๋ถ€ ์„œ๋น„์Šค๋ฅผ ์ด์šฉํ•ด ์™”๋‹ค. ์ •๋ถ€๋Š” ์–‘์งˆ์˜ ์„œ๋น„์Šค๋ฅผ ์ œ๊ณตํ•˜๊ธฐ ์œ„ํ•ด ์ „์ž ์ •๋ถ€์— ๋งŽ์€ ํˆฌ์ž๋ฅผ ํ•ด์™”๊ณ , ์ง€์—ญ ์‚ฌํšŒ์™€ ์ดํ•ด ๊ด€๊ณ„์ž๋“ค์„ ์˜์‚ฌ ๊ฒฐ์ • ๊ณผ์ •์— ๊ด€์—ฌํ•˜๊ฒŒ ํ•˜๊ณ  ๋ถ€ํŒจ๋ฅผ ์ตœ์†Œํ™”ํ•˜๋ ค๋Š” ์˜๋„๋กœ ์ฐธ์—ฌ์‹œ์ผœ์™”๋‹ค. ์ „์ž์ •๋ถ€ ์‚ฌ์šฉ์ž์˜ ๋งŒ์กฑ๋„์— ์‹ค์ œ๋กœ ์˜ํ–ฅ์„ ๋ฏธ์น˜๋Š” ์š”์†Œ๊ฐ€ ๋ฌด์—‡์ธ์ง€์— ๋Œ€ํ•œ ์งˆ๋ฌธ์€ ์—ฌ์ „ํžˆ ๋‚จ์•„ ์žˆ๋‹ค. ๋ณธ ์—ฐ๊ตฌ์˜ ๋ชฉ์ ์€ ํƒ„์ž๋‹ˆ์•„ ์‚ฌ๋ฒ•๋ถ€์˜ E-Office Management ์‹œ์Šคํ…œ์„ ์‚ฌ๋ก€์—ฐ๊ตฌ๋กœ ํ™œ์šฉํ•˜์—ฌ ์ „์ž์ •๋ถ€ ์ด์šฉ์ž์˜ ๋งŒ์กฑ๋„์— ์˜ํ–ฅ์„ ๋ฏธ์น˜๋Š” ์š”์ธ์„ ๋ถ„์„ํ•˜๋Š” ๊ฒƒ์ด๋‹ค. ๋ณธ ์—ฐ๊ตฌ์—์„œ๋Š” ์ „์ž์ •๋ถ€ ๋ถ„์•ผ์— ๊ด€ํ•œ ๋ฌธํ—Œ์ž๋ฃŒ๋ฅผ ๋ฐ”ํƒ•์œผ๋กœ ์ „์ž์‚ฌ๋ฌด๊ด€๋ฆฌ์‹œ์Šคํ…œ ์ด์šฉ์ž์˜ ๋งŒ์กฑ๋„์— ์˜ํ–ฅ์„ ๋ฏธ์น  ์ˆ˜ ์žˆ๋Š” 4๊ฐ€์ง€ ๋…๋ฆฝ๋ณ€์ˆ˜๋ฅผ ํ™•์ธํ•˜์˜€๋‹ค. ๋ณธ ์—ฐ๊ตฌ์—์„œ ํ™•์ธ๋œ ๋…๋ฆฝ ๋ณ€์ˆ˜๋Š” ์‹œ์Šคํ…œ ํ’ˆ์งˆ, ์ •๋ณด ํ’ˆ์งˆ, ์„œ๋น„์Šค ํ’ˆ์งˆ, ๋ณด์•ˆ ๋ฐ ๊ฐœ์ธ ์ •๋ณด ๋ณดํ˜ธ์ด๋‹ค. ๋˜ํ•œ ์—ฐ๊ตฌ์˜ ํ†ต์ œ๋ณ€์ˆ˜๋กœ๋Š” ์„ฑ๋ณ„, ์—ฐ๋ น, ๊ต์œก์ˆ˜์ค€, ๊ทผ๋ฌด๊ฒฝ๋ ฅ, ์ง์œ„, E-Office Management ์‹œ์Šคํ…œ ์‚ฌ์šฉ๋นˆ๋„ ๋“ฑ์ด ์‚ฌ์šฉ๋˜๊ณ  ์žˆ๋‹ค. ๋ณธ ์—ฐ๊ตฌ์—์„œ๋Š” 4๊ฐœ์˜ ๋…๋ฆฝ๋ณ€์ˆ˜๋กœ๋ถ€ํ„ฐ 4๊ฐœ์˜ ๊ฐ€์„ค์„ ์ˆ˜๋ฆฝํ•˜์˜€๋‹ค. E-Office Management ์‹œ์Šคํ…œ์— ์ ‘๊ทผํ•  ์ˆ˜ ์žˆ๋Š” ํƒ„์ž๋‹ˆ์•„ ์‚ฌ๋ฒ•๋ถ€ ์ง์› 112๋ช…์˜ ์กฐ์‚ฌ ๋ฐ์ดํ„ฐ๋ฅผ ์ˆ˜์ง‘ํ•˜์—ฌ ์—ฐ๊ตฌ์˜ ๋„ค ๊ฐ€์ง€ ๊ฐ€์„ค์„ ํ…Œ์ŠคํŠธํ–ˆ๋‹ค. IBM SPSS Statistics ์†Œํ”„ํŠธ์›จ์–ด๋ฅผ ์‚ฌ์šฉํ•˜์—ฌ ๋ณธ ์—ฐ๊ตฌ์˜ ์‘๋‹ต์ž๋กœ๋ถ€ํ„ฐ ์ˆ˜์ง‘๋œ ๋ฐ์ดํ„ฐ๋ฅผ ๋ถ„์„ํ•˜์˜€๋‹ค. ๋ณธ ์—ฐ๊ตฌ๋Š” ์ •๋ณด ํ’ˆ์งˆ๊ณผ ๋ณด์•ˆ ๋ฐ ๊ฐœ์ธ์ •๋ณด๋ณดํ˜ธ๊ฐ€ E-Office Management ์‹œ์Šคํ…œ ์‚ฌ์šฉ์ž์˜ ๋งŒ์กฑ๋„์— ๊ธ์ •์ ์ธ ์˜ํ–ฅ์„ ๋ฏธ์น˜๋Š” ๊ฒƒ์œผ๋กœ ๋‚˜ํƒ€๋‚ฌ์œผ๋‚˜, ์‹œ์Šคํ…œ ํ’ˆ์งˆ๊ณผ ์„œ๋น„์Šค ํ’ˆ์งˆ์ด E-Office Management ์‹œ์Šคํ…œ ์‚ฌ์šฉ์ž์˜ ๋งŒ์กฑ๋„์— ๊ธ์ •์ ์ธ ์˜ํ–ฅ์„ ๋ฏธ์น˜๋Š”์ง€๋Š” ํ™•์ธํ•˜์ง€ ๋ชปํ•˜์˜€๋‹ค. ๋˜ํ•œ ๋ชจ๋“  ํ†ต์ œ๋ณ€์ˆ˜๊ฐ€ ์ด์šฉ์ž ๋งŒ์กฑ๋„์— ๊ธ์ •์ ์ธ ์˜ํ–ฅ์„ ๋ฏธ์น˜๋Š” ๊ฒƒ์œผ๋กœ ํ™•์ธ๋˜์ง€ ์•Š์•˜๋‹ค. ๋ณธ ์—ฐ๊ตฌ์˜ ๊ฒฐ๊ณผ๋Š” ์˜์‚ฌ๊ฒฐ์ •์ž๋“ค์—๊ฒŒ ์ „์ž์ •๋ถ€ ์ด์šฉ์ž์˜ ๋งŒ์กฑ๋„์— ๊ธ์ •์ ์ธ ์˜ํ–ฅ์„ ๋ฏธ์น˜๋Š” ์š”์†Œ๋“ค์„ ๊ณ ๋ คํ•  ์ˆ˜ ์žˆ๋Š” ๋ช‡ ๊ฐ€์ง€ ํ†ต์ฐฐ์„ ์ œ๊ณตํ•˜๋ฉฐ, ์„œ๋น„์Šค ํ’ˆ์งˆ๊ณผ ์‹œ์Šคํ…œ ํ’ˆ์งˆ์ด ์ „์ž์ •๋ถ€ ์ด์šฉ์ž์˜ ๋งŒ์กฑ๋„์— ๋ฏธ์น˜๋Š” ์˜ํ–ฅ์— ๋Œ€ํ•œ ๋” ๋งŽ์€ ์—ฐ๊ตฌ๋ฅผ ์ˆ˜ํ–‰ํ•  ๊ฒƒ์„ ์š”๊ตฌํ•œ๋‹ค. ํ‚ค์›Œ๋“œ: ์‹œ์Šคํ…œ ํ’ˆ์งˆ, ์ •๋ณด ํ’ˆ์งˆ, ์„œ๋น„์Šค ํ’ˆ์งˆ, ๋ณด์•ˆ ๋ฐ ๊ฐœ์ธ ์ •๋ณด ๋ณดํ˜ธ, ์ „์ž ์ •๋ถ€ ์‚ฌ์šฉ์ž ๋งŒ์กฑ๋„ ํ•™๋ฒˆ: 2021-28985CHAPTER 1. INTRODUCTION 1 1.1 Background and Research Question 1 1.2 Significance and Purpose of the research 3 1.3 Scope of the research 4 1.4 Research Methodology 6 CHAPTER 2: THEORETICAL BACKGROUND AND LITERATURE REVIEW 8 2.1 Theoretical Background 8 2.2 The Concept of E-Government and E-Government in Tanzania 12 2.2.1 Defining E-Government 12 2.2.2 E-Government Development Stages 14 2.2.3 E-government in Tanzania. 17 2.2.4 Functions of E-Government in Tanzania 21 2.2.5 Advantages of e-Government in Tanzania 23 2.2.6 Challenges of e-Government in Tanzania 24 2.2.7 E-Office Management System in Tanzania 25 2.2.8 Information System Models 28 2.2.9 Theoretical frameworks for e-Government success 32 2.3 E-Government users satisfaction 37 2.3.1 Factors Influencing E-Government Users Satisfaction 37 2.3.2 System Quality 38 2.3.3 Information Quality 38 2.3.4 Service Quality 39 2.3.5 Security and Privacy 39 2.4 Literature Review 40 2.5 Gap Analysis 45 CHAPTER 3. RESEARCH METHODOLOGY 46 3.1 Research design 46 3.2 Analytical framework 47 3.3 Research Hypotheses 48 3.3.1 System Quality and E-Office Management System Satisfaction 49 3.3.2 Information Quality and E-Office Management System Satisfaction 50 3.3.3 Service Quality and E-Office Management System Satisfaction 51 3.3.4 Security, Privacy and E-Office Management System Satisfaction 51 3.4 Conceptualization and Operationalization 53 3.4.1 E-Government Services Satisfaction 53 3.4.2 System Quality 53 3.4.3 Information Quality 54 3.4.4 Service Quality 54 3.4.5 Security and Privacy 55 3.4.6 Gender 55 3.4.7 Working Experience 56 3.4.8 Age 56 3.4.9 Level of Education 56 3.4.10 Job Position 57 3.4.11 Frequency of Using 57 3.5 Measurement and Data Sources 57 3.5.1 Survey Questionnaire 58 3.6 Sampling and Data Collection 58 3.6.1 Population of the Study 59 3.6.2 Sampling Frame 59 3.6.3 Sample to be studied 59 3.6.4 Sampling Method 60 3.6.5 Survey Instrument 60 3.6.6 Data Collection 61 3.7 Data Processing and Data Analysis 62 3.8 Reliability and Validity 62 CHAPTER 4. PRESENTATION, ANALYSIS AND DISCUSSION OF FINDINGS 63 4.1 Response Rate 63 4.2 Reliability Statistics 64 4.3. Respondents Demographic Characteristics 64 4.4 Descriptive Statistics 66 4.5 Demographic categories in comparison with Dependent and Independent Variables 68 4.5.1 Demographic categories in comparison with E-Office Management System users satisfaction 68 4.5.2 Demographic categories in comparison with System Quality 70 4.5.3 Demographic categories in comparison with Information Quality 71 4.5.4 Demographic categories in comparison with Service Quality 73 4.5.5 Demographic categories in comparison with Security and Privacy 76 4.6 Multicollinearity Analysis 78 4.7 Correlation Analysis 79 4.8 Regression Analysis 82 4.8.1 Model Summary 83 4.8.2 ANOVAa 83 4.8.3 Coefficients of multiple Regression 84 4.9 HYPOTHESES TESTING 85 4.9.1. System Quality 85 4.9.2 Information Quality 86 4.9.3 Service Quality 86 4.9.4 Security and Privacy 87 4.9.5 Summary of Findings 87 4.10 DISCUSSION OF FINDINGS 88 4.10.1 E-Office Management System users satisfaction 88 4.10.2 System Quality on e-Office Management System Users satisfaction. 89 4.10.3 Information Quality on e-Office Management System Users satisfaction. 90 4.10.4 Service Quality on e-Office Management System Users satisfaction. 91 4.10.5 Security and Privacy on e-Office Management System Users satisfaction. 91 4.10.6 Gender, age, level of education, working experience, job level (position) and frequency of use on e-Office Management System users satisfaction. 92 CHAPTER 5. CONCLUSION 94 5.1. Conclusion 94 5.2. Recommendations 98 5.3. Limitations of the Study 98์„
    corecore