525 research outputs found

    A secure data outsourcing scheme based on Asmuth – Bloom secret sharing

    Get PDF
    The file attached to this record is the author's final peer reviewed version. The Publisher's final version can be found by following the DOI link.Data outsourcing is an emerging paradigm for data management in which a database is provided as a service by third-party service providers. One of the major benefits of offering database as a service is to provide organisations, which are unable to purchase expensive hardware and software to host their databases, with efficient data storage accessible online at a cheap rate. Despite that, several issues of data confidentiality, integrity, availability and efficient indexing of users’ queries at the server side have to be addressed in the data outsourcing paradigm. Service providers have to guarantee that their clients’ data are secured against internal (insider) and external attacks. This paper briefly analyses the existing indexing schemes in data outsourcing and highlights their advantages and disadvantages. Then, this paper proposes a secure data outsourcing scheme based on Asmuth–Bloom secret sharing which tries to address the issues in data outsourcing such as data confidentiality, availability and order preservation for efficient indexing

    An Inherent Optical Properties Data Processing System for Achieving Consistent Ocean Color Products From Different Ocean Color Satellites

    Get PDF
    We used field measurements and multimission satellite data to evaluate how well an inherent optical properties (IOPs) data processing system performed at correcting the residual error of the atmospheric correction in satellite remote sensing reflectance (R-rs) and how well the system simultaneously minimized intermission biases between different remote sensing systems. We developed the IOPs data processing system as a semianalytical algorithm called IDAS. Our results show that IDAS generates accurate and consistent IOPs products from two ocean color missions: Sea-viewing Wide Field-of-View Sensor (SeaWiFS) and Moderate Resolution Imaging Spectroradiometer Aqua (MODISA). Specifically, with "high-quality" SeaWiFS and MODISA R-rs data, IDAS provided temporally consistent IOPs products for the oligotrophic open ocean resulting in an annual mean intermission difference of less than 3%, which is significantly lower than what a quasi-analytical algorithm (QAA) provided. We used IDAS to generate a long time series of b(b)(555) from the Northwest Atlantic Subtropical Gyre using SeaWiFS (1998 to 2002) and MODISA (2003 to 2017) images. Our results show that the IDAS-derived annual b(b)(555) decreased monotonically by 2.81% per decade from 1998 to 2017. Comparing the IDAS-generated annual trend for b(b)(555) to the same data processed with the QAA algorithm, we found that the QAA results differed because of impacts of the residual errors of the atmospheric correction and intermission biases. The differences in the annual trends existed despite the same temporal changing patterns of in situ particulate organic carbon existing in the Sargasso Sea and in the satellite chlorophyll-a concentration in the Northwest Atlantic Subtropical Gyre

    Evaluating the FIWARE Platform

    Get PDF
    This paper describes the result of a thorough analysis and evaluation of the so-called FIWARE platform from a smart application development point of view. FIWARE is the result of a series of well-funded EU projects that is currently intensively promoted throughout public agencies in Europe and world-wide. The goal was to figure out how services provided by FIWARE facilitate the development of smart applications. It was conducted first by an analysis of the central components that make up the service stack, followed by the implementation of a pilot project that aimed on using as many of these services as possibl

    Digital processing of mesoscale analysis and space sensor data

    Get PDF
    The mesoscale analysis and space sensor (MASS) data management and analysis system on the research computer system is presented. The MASS data base management and analysis system was implemented on the research computer system which provides a wide range of capabilities for processing and displaying large volumes of conventional and satellite derived meteorological data. The research computer system consists of three primary computers (HP-1000F, Harris/6, and Perkin-Elmer 3250), each of which performs a specific function according to its unique capabilities. The overall tasks performed concerning the software, data base management and display capabilities of the research computer system in terms of providing a very effective interactive research tool for the digital processing of mesoscale analysis and space sensor data is described

    Vol. 17, no. 1: Full Issue

    Get PDF

    Safeguarding health data with enhanced accountability and patient awareness

    Get PDF
    Several factors are driving the transition from paper-based health records to electronic health record systems. In the United States, the adoption rate of electronic health record systems significantly increased after "Meaningful Use" incentive program was started in 2009. While increased use of electronic health record systems could improve the efficiency and quality of healthcare services, it can also lead to a number of security and privacy issues, such as identity theft and healthcare fraud. Such incidents could have negative impact on trustworthiness of electronic health record technology itself and thereby could limit its benefits. In this dissertation, we tackle three challenges that we believe are important to improve the security and privacy in electronic health record systems. Our approach is based on an analysis of real-world incidents, namely theft and misuse of patient identity, unauthorized usage and update of electronic health records, and threats from insiders in healthcare organizations. Our contributions include design and development of a user-centric monitoring agent system that works on behalf of a patient (i.e., an end user) and securely monitors usage of the patient's identity credentials as well as access to her electronic health records. Such a monitoring agent can enhance patient's awareness and control and improve accountability for health records even in a distributed, multi-domain environment, which is typical in an e-healthcare setting. This will reduce the risk and loss caused by misuse of stolen data. In addition to the solution from a patient's perspective, we also propose a secure system architecture that can be used in healthcare organizations to enable robust auditing and management over client devices. This helps us further enhance patients' confidence in secure use of their health data.PhDCommittee Chair: Mustaque Ahamad; Committee Member: Douglas M. Blough; Committee Member: Ling Liu; Committee Member: Mark Braunstein; Committee Member: Wenke Le

    Development Direction Research Of Korean Lifestyle Brands Through Analysis For Global Lifestyle Brands - Focused On The Trend Analysis

    Get PDF
    As global lifestyle brands are recognized by consumers worldwide, their business are winning a great success. Now that in Korea too, a large-family culture in which members are accustomed to concession and self-sacrifice is changing to a lifestyle of single households, people care a lot about their own properties, privacy, and personalities. As a result, many original cultures reflect that individuals ?lifestyles” are emerging. This study suggests development directions for Korean lifestyle brands to grow in line with such social trends and to compete with global lifestyle brands. Based on the survey of Koreans “major lifestyle trends, concepts and products that would represent Koreans” emotions and attract domestic consumers are examined and suggested in this study

    The Role of Cross-Domain Use Cases in IoT – A Case Analysis

    Get PDF
    The strong rise of Internet connected things contrib- utes to the big data phenomenon. Data is increasingly becoming available from various devices in large vol- ume, variety and velocity. However, many Internet of Things (IoT) applications still seem to be used to solve single problems and infrastructural elements (e.g. sen- sors or data) are not openly available for other use cases. This paper argues that a growing need for cross- domain applications is approaching within the sharing economy and other ecosystem-based business models. It investigates the current state of such cross-domain ap- plications by analyzing currently deployed IoT case studies. The analysis shows that most cases remain in the silo mentality and focus on a specific domain. Only a few cases feature some cross-domain characteristics. These are especially present in smart city cases, which engage multiple stakeholders and promote the share of resources
    • 

    corecore