245 research outputs found

    Business Information Exchange System with Security, Privacy, and Anonymity

    Get PDF

    A survey on security, privacy and anonymity in legal distribution of copyrighted multimedia content over peer-to-peer networks

    Full text link

    The Serums Tool-Chain:Ensuring Security and Privacy of Medical Data in Smart Patient-Centric Healthcare Systems

    Get PDF
    Digital technology is permeating all aspects of human society and life. This leads to humans becoming highly dependent on digital devices, including upon digital: assistance, intelligence, and decisions. A major concern of this digital dependence is the lack of human oversight or intervention in many of the ways humans use this technology. This dependence and reliance on digital technology raises concerns in how humans trust such systems, and how to ensure digital technology behaves appropriately. This works considers recent developments and projects that combine digital technology and artificial intelligence with human society. The focus is on critical scenarios where failure of digital technology can lead to significant harm or even death. We explore how to build trust for users of digital technology in such scenarios and considering many different challenges for digital technology. The approaches applied and proposed here address user trust along many dimensions and aim to build collaborative and empowering use of digital technologies in critical aspects of human society

    Secure multi-party based cloud computing framework for statistical data analysis of encrypted data

    Get PDF
    Secure Multi-party Computation (SMC) is a paradigm used to accomplish a common computation among multiple users while keeping the data of each party secret from others. In recent years there has been a keen interest among the research community to look for techniques that can be adopted for the evolvement of SMC based solutions for improving its e ciency and performance. Cloud computing is a next generation computing solution in the eld of Information and Communication Technology (ICT) which allows its users to use high speed infrastructure and services provided by Cloud Service Providers (CSP) in a cost e ective manner with a higher availability. There- fore, deployment of cloud based architecture for SMCs would aid in improving its performance and e ciency. However, cloud based solutions raises concerns over secu- rity of users' private data, since data is handled by an external party that cannot be trusted. Hence, it is necessary to incorporate necessary security measures to ensure the security of users' private data. In this master's thesis we have addressed this issue by proposing a Secure Multi- party based Cloud Computing Framework which can ensure security, privacy and anonymity of users private data. In order to achieve this, we have formulated a case involving sales data analysis of a certain organization through computing statistical parameters of sales persons private sales data on a cloud environment. Furthermore, we have implemented a prototype of the proposed security framework which aids us to evaluate its performance. Moreover, considering the results that we have obtained, it is conclusive that cloud platforms can be successfully deployed to improve e ciency of SMCs while ensuring the security of users' private data; which in turn provides evidence for the practicability of multi-party based cloud computing solutions

    Identifying Key Sectors in the Regional Economy: A Network Analysis Approach Using Input-Output Data

    Full text link
    By applying network analysis techniques to large input-output system, we identify key sectors in the local/regional economy. We overcome the limitations of traditional measures of centrality by using random-walk based measures, as an extension of Blochl et al. (2011). These are more appropriate to analyze very dense networks, i.e. those in which most nodes are connected to all other nodes. These measures also allow for the presence of recursive ties (loops), since these are common in economic systems (depending to the level of aggregation, most firms buy from and sell to other firms in the same industrial sector). The centrality measures we present are well suited for capturing sectoral effects missing from the usual output and employment multipliers. We also develop an R package (xtranat) for the processing of data from IMPLAN(R) models and for computing the newly developed measures

    CRYPTOCURRENCY: A MINE OF CONTROVERSIES

    Get PDF
    Cryptocurrency is attracting the attention of many disciplines. Based on a systematic literature review, thestate of art of academic research on cryptocurrency was investigated, demonstrating its complexity andthe lack of consensus about several issues, as its definition, its operation without a financial institution,the impacts on economy and its future developments. Considering these issues, Actor-Network Theorywas selected as a theory that can provide methods, such as controversy mapping, to understand thiscomplex subject. The article analyzes this scenario, presenting a set of research topics that can beconsidered to study controversies related to cryptocurrency.Cryptocurrency is attracting the attention of many disciplines. Based on a systematic literature review, thestate of art of academic research on cryptocurrency was investigated, demonstrating its complexity andthe lack of consensus about several issues, as its definition, its operation without a financial institution,the impacts on economy and its future developments. Considering these issues, Actor-Network Theorywas selected as a theory that can provide methods, such as controversy mapping, to understand thiscomplex subject. The article analyzes this scenario, presenting a set of research topics that can beconsidered to study controversies related to cryptocurrency

    Navigating the Challenges of the Cloud

    Full text link
    The article discusses the advantages of cloud-based services as well as the issues presented when an institution does not have full control of its own data

    Internet of Things: Cybersecurity in Small Businesses

    Get PDF
    Small businesses are the most vital part of a nation’s economy. In today’s world, as we are moving towards digitizing almost everything around us, cybersecurity is essential and vital for our digitalized world to function. Small businesses are no exception. All businesses collect, use, and store information. They store employees’ information, tax information, customers’ information, business transaction information, and all other operational information that is needed for a business to function. Without an appropriate cybersecurity program, these businesses are vulnerable and can be easily impacted by cyber incidents and malicious attacks. Businesses are putting resources to protect their systems against malicious attacks. Although small businesses, due to their limited budget, do not have enough resources to implement a continuous and flexible security program for the protection of their information systems. Therefore, small businesses are often called “soft targets\u27\u27 among hackers. Small business owners believe there might be no valuable information in their business to protect, but often hackers open their way from less secure systems toward the high-profile targets using small security gaps. Additionally, there are a number of factors behind cyber attacks on small businesses. Attackers are not often after profit. They might have intentions to disrupt the business due to negative rivalries and market competitions. Therefore, a pragmatic security program is a solution to address these needs and concerns. This research review will focus on technological and security concerns surrounding small businesses, financial impacts of cyber incidents on small businesses, and solutions to address security concerns in small businesses by proposing procedures to help protect information systems. The review encompasses a section for the research methodology, a literature review where the topic is broken down into subtopics, a discussion, and a conclusion to summarize the whole review

    State of the art in privacy preservation in video data

    Full text link
    Active and Assisted Living (AAL) technologies and services are a possible solution to address the crucial challenges regarding health and social care resulting from demographic changes and current economic conditions. AAL systems aim to improve quality of life and support independent and healthy living of older and frail people. AAL monitoring systems are composed of networks of sensors (worn by the users or embedded in their environment) processing elements and actuators that analyse the environment and its occupants to extract knowledge and to detect events, such as anomalous behaviours, launch alarms to tele-care centres, or support activities of daily living, among others. Therefore, innovation in AAL can address healthcare and social demands while generating economic opportunities. Recently, there has been far-reaching advancements in the development of video-based devices with improved processing capabilities, heightened quality, wireless data transfer, and increased interoperability with Internet of Things (IoT) devices. Computer vision gives the possibility to monitor an environment and report on visual information, which is commonly the most straightforward and human-like way of describing an event, a person, an object, interactions and actions. Therefore, cameras can offer more intelligent solutions for AAL but they may be considered intrusive by some end users. The General Data Protection Regulation (GDPR) establishes the obligation for technologies to meet the principles of data protection by design and by default. More specifically, Article 25 of the GDPR requires that organizations must "implement appropriate technical and organizational measures [...] which are designed to implement data protection principles [...] , in an effective manner and to integrate the necessary safeguards into [data] processing.” Thus, AAL solutions must consider privacy-by-design methodologies in order to protect the fundamental rights of those being monitored. Different methods have been proposed in the latest years to preserve visual privacy for identity protection. However, in many AAL applications, where mostly only one person would be present (e.g. an older person living alone), user identification might not be an issue; concerns are more related to the disclosure of appearance (e.g. if the person is dressed/naked) and behaviour, what we called bodily privacy. Visual obfuscation techniques, such as image filters, facial de-identification, body abstraction, and gait anonymization, can be employed to protect privacy and agreed upon by the users ensuring they feel comfortable. Moreover, it is difficult to ensure a high level of security and privacy during the transmission of video data. If data is transmitted over several network domains using different transmission technologies and protocols, and finally processed at a remote location and stored on a server in a data center, it becomes demanding to implement and guarantee the highest level of protection over the entire transmission and storage system and for the whole lifetime of the data. The development of video technologies, increase in data rates and processing speeds, wide use of the Internet and cloud computing as well as highly efficient video compression methods have made video encryption even more challenging. Consequently, efficient and robust encryption of multimedia data together with using efficient compression methods are important prerequisites in achieving secure and efficient video transmission and storage.This publication is based upon work from COST Action GoodBrother - Network on Privacy-Aware Audio- and Video-Based Applications for Active and Assisted Living (CA19121), supported by COST (European Cooperation in Science and Technology). COST (European Cooperation in Science and Technology) is a funding agency for research and innovation networks. Our Actions help connect research initiatives across Europe and enable scientists to grow their ideas by sharing them with their peers. This boosts their research, career and innovation. www.cost.e
    • …
    corecore