13,519 research outputs found
Ensuring patients privacy in a cryptographic-based-electronic health records using bio-cryptography
Several recent works have proposed and implemented cryptography as a means to
preserve privacy and security of patients health data. Nevertheless, the
weakest point of electronic health record (EHR) systems that relied on these
cryptographic schemes is key management. Thus, this paper presents the
development of privacy and security system for cryptography-based-EHR by taking
advantage of the uniqueness of fingerprint and iris characteristic features to
secure cryptographic keys in a bio-cryptography framework. The results of the
system evaluation showed significant improvements in terms of time efficiency
of this approach to cryptographic-based-EHR. Both the fuzzy vault and fuzzy
commitment demonstrated false acceptance rate (FAR) of 0%, which reduces the
likelihood of imposters gaining successful access to the keys protecting
patients protected health information. This result also justifies the
feasibility of implementing fuzzy key binding scheme in real applications,
especially fuzzy vault which demonstrated a better performance during key
reconstruction
The Adoption of Blockchain Technologies in Data Sharing: A State of the Art Survey
In the big data era, it is a significant need for data sharing in various industries. However, there are many weaknesses in the traditional centralized way of data sharing. It is easy to attack the centralized data storage center. As the process of data asset transactions is not transparent, there is a lack of trust in the percipients of data sharing. Blockchain technology offers a possibility to solve these problems in data sharing, as the blockchain can provide a decentralized, programmable, tamperproof, and anonymous data sharing environment. In this paper, we compare the blockchain-based data sharing with the traditional ways of data sharing, and analyze the scenarios in major industry applications. We survey the state of the art of the adoption of blockchain technologies in data sharing, and provide a summary about their technical frameworks and schemes
Illegal, Unreported and Unregulated (IUU) Fishing: A Whitepaper
Illegal, unregulated and unreported (IUU) fishing refers to fishing activities that do not comply with regional, national, or international fisheries conservation or management measures. This whitepaper characterizes the status of Illegal, unregulated, and unreported fishing, the philanthropic community's current efforts to help reduce it, and potential opportunities for the Packard Foundation to become more actively engaged. The paper was drafted between March and June 2015, following a combination of desk research and a handful of select interviews
JPEG privacy and security framework for social networking and GLAM services
Current image coding standards provide limited support for privacy and security features. An exception is the JPSEC standard, which defines security extensions in JPEG 2000 specifications (part 8). Notwithstanding this shortcoming, the JPEG committee is currently defining a new JPEG Systems standard, which envisages privacy and security support across JPEG family of standards. In this manuscript, the main philosophy of this emerging specification is outlined along with typical use cases, main requirements as well as examples of potential technological solutions. The upcoming specification guarantees backward and forward compatibility with earlier standards and legacy implementations. Finally, we illustrate the introduced framework by two applications targeting secure photo sharing on social networks and IPR management in the GLAM sector.Peer ReviewedPostprint (published version
- …