382 research outputs found

    Digital Financial Markets and (Europe's) Private Law – A Case for Regulatory Competition?

    Get PDF

    Health Participatory Sensing Networks for Mobile Device Public Health Data Collection and Intervention

    Get PDF
    The pervasive availability and increasingly sophisticated functionalities of smartphones and their connected external sensors or wearable devices can provide new data collection capabilities relevant to public health. Current research and commercial efforts have concentrated on sensor-based collection of health data for personal fitness and personal healthcare feedback purposes. However, to date there has not been a detailed investigation of how such smartphones and sensors can be utilized for public health data collection. Unlike most sensing applications, in the case of public health, capturing comprehensive and detailed data is not a necessity, as aggregate data alone is in many cases sufficient for public health purposes. As such, public health data has the characteristic of being capturable whilst still not infringing privacy, as the detailed data of individuals that may allow re-identification is not needed, but rather only aggregate, de-identified and non-unique data for an individual. These types of public health data collection provide the challenge of the need to be flexible enough to answer a range of public health queries, while ensuring the level of detail returned preserves privacy. Additionally, the distribution of public health data collection request and other information to the participants without identifying the individual is a core requirement. An additional requirement for health participatory sensing networks is the ability to perform public health interventions. As with data collection, this needs to be completed in a non-identifying and privacy preserving manner. This thesis proposes a solution to these challenges, whereby a form of query assurance provides private and secure distribution of data collection requests and public health interventions to participants. While an additional, privacy preserving threshold approach to local processing of data prior to submission is used to provide re-identification protection for the participant. The evaluation finds that with manageable overheads, minimal reduction in the detail of collected data and strict communication privacy; privacy and anonymity can be preserved. This is significant for the field of participatory health sensing as a major concern of participants is most often real or perceived privacy risks of contribution

    A review of the state of the art in privacy and security in the eHealth cloud

    Get PDF
    The proliferation and usefulness of cloud computing in eHealth demands high levels of security and privacy for health records. However, eHealth clouds pose serious security and privacy concerns for sensitive health data. Therefore, practical and effective methods for security and privacy management are essential to preserve the privacy and security of the data. To review the current research directions in security and privacy in eHealth clouds, this study has analysed and summarized the state of the art technologies and approaches reported in security and privacy in the eHealth cloud. An extensive review covering 132 studies from several peer-reviewed databases such as IEEE Xplore was conducted. The relevant studies were reviewed and summarized in terms of their benefits and risks. This study also compares several research works in the domain of data security requirements. This paper will provide eHealth stakeholders and researchers with extensive knowledge and information on current research trends in the areas of privacy and security

    Decentralised and Collaborative Auditing of Workflows

    Get PDF
    Workflows involve actions and decision making at the level of each participant. Trusted generation, collection and storage of evidence is fundamental for these systems to assert accountability in case of disputes. Ensuring the security of audit systems requires reliable protection of evidence in order to cope with its confidentiality, its integrity at generation and storage phases, as well as its availability. Collusion with an audit authority is a threat that can affect all these security aspects, and there is room for improvement in existent approaches that target this problem. This work presents an approach for workflow auditing which targets security challenges of collusion-related threats, covers different trust and confidentiality requirements, and offers flexible levels of scrutiny for reported events. It relies on participants verifying each other's reported audit data, and introduces a secure mechanism to share encrypted audit trails with participants while protecting their confidentiality. We discuss the adequacy of our audit approach to produce reliable evidence despite possible collusion to destroy, tamper with, or hide evidence

    Getting started with cloud computing : a LITA guide

    Get PDF
    "A one-stop guide for implementing cloud computing. Cloud computing can save your library time and money by enabling convenient, on-demand network access to resources like servers and applications. Libraries that take advantage of the cloud have fewer IT headaches because data centers provide continuous updates and mobility that standard computing cannot easily provide, which means less time and energy spent on software, and more time and energy to devote to the library's day to day mission and services. Here, leading LITA experts demystify language, deflate hype, and provide library-specific examples of real-world success you can emulate to guarantee efficiency and savings. Among several features, this book helps you select data access and file sharing services, build digital repositories, and utilize other cloud computing applications in your library. Together, you and the cloud can save time and money, and build the information destination your patrons will love."--Publisher's website.Edward M. Corrado, Heather Lea Moulaison, Editors ; with a Foreword by Roy Tennant.Perspectives on cloud computing in libraries / Heather Lea Moulaison and Edward M. Corrado -- Understanding the cloud : an introduction to the cloud / Rosalyn Metz -- Cloud computing : pros and cons / H. Frank Cervone -- What could computing means for libraries / Erik Mitchell -- Head in the clouds? A librarian/vendor perspective on cloud computing / Carl Grant -- Cloud computing for LIS education / Christinger R. Tomer and Susan W. Alman -- Library discovery services : from the ground to the cloud / Marshall Breeding -- Koha in the cloud / Christopher R. Nighswonger and Nicole C. Engard -- Leveraging OCLC cooperative library data in the cloud via web services / Karen A. Coombs -- Building push-button repositories in the cloud with dspace and amazon web services -- Untethering considerations : selecting a cloud-based data access and file-sharing solution / Heidi M. Nickisch Duggan and Michelle Frisque -- Sharepoint strategies for establishing a powerful library intranet / Jennifer Diffin and Dennis Nangle -- Using windows home server and amazon s3 to back up high-resolution digital objects to the cloud / Edward Iglesias -- Keeping your data on the ground when putting your (lib)guides in the cloud / Karen A. Reiman-Sendi, Kenneth J. Varnum, and Albert A. Bertram -- Parting the clouds : use of dropbox by embedded librarians / Caitlin A. Bagley -- From the cloud, a clear solution : how one academic library uses google calendar / Anne Leonard -- Integrating google forms into reference and instruction / Robin Elizabeth Miller -- Ning, fostering conversations in the cloud / Leland R. Deeds, Cindy Kissel-Ito, and Ann Thomas Knox -- Not every cloud has a silver lining : using a cloud application may not always be the best solution / Ann Whitney Gleason -- Speak up! using voicethread to encourage participation and collaboration in library instruction / Jennifer Ditkoff and Kara Young.Includes bibliographical references and index

    Security Audit Compliance for Cloud Computing

    Get PDF
    Cloud computing has grown largely over the past three years and is widely popular amongst today's IT landscape. In a comparative study between 250 IT decision makers of UK companies they said, that they already use cloud services for 61% of their systems. Cloud vendors promise "infinite scalability and resources" combined with on-demand access from everywhere. This lets cloud users quickly forget, that there is still a real IT infrastructure behind a cloud. Due to virtualization and multi-tenancy the complexity of these infrastructures is even increased compared to traditional data centers, while it is hidden from the user and outside of his control. This makes management of service provisioning, monitoring, backup, disaster recovery and especially security more complicated. Due to this, and a number of severe security incidents at commercial providers in recent years there is a growing lack of trust in cloud infrastructures. This thesis presents research on cloud security challenges and how they can be addressed by cloud security audits. Security requirements of an Infrastructure as a Service (IaaS) cloud are identified and it is shown how they differ from traditional data centres. To address cloud specific security challenges, a new cloud audit criteria catalogue is developed. Subsequently, a novel cloud security audit system gets developed, which provides a flexible audit architecture for frequently changing cloud infrastructures. It is based on lightweight software agents, which monitor key events in a cloud and trigger specific targeted security audits on demand - on a customer and a cloud provider perspective. To enable these concurrent cloud audits, a Cloud Audit Policy Language is developed and integrated into the audit architecture. Furthermore, to address advanced cloud specific security challenges, an anomaly detection system based on machine learning technology is developed. By creating cloud usage profiles, a continuous evaluation of events - customer specific as well as customer overspanning - helps to detect anomalies within an IaaS cloud. The feasibility of the research is presented as a prototype and its functionality is presented in three demonstrations. Results prove, that the developed cloud audit architecture is able to mitigate cloud specific security challenges
    • …
    corecore