2,278 research outputs found

    How blockchain impacts cloud-based system performance: a case study for a groupware communication application

    Get PDF
    This paper examines the performance trade-off when implementing a blockchain architecture for a cloud-based groupware communication application. We measure the additional cloud-based resources and performance costs of the overhead required to implement a groupware collaboration system over a blockchain architecture. To evaluate our groupware application, we develop measuring instruments for testing scalability and performance of computer systems deployed as cloud computing applications. While some details of our groupware collaboration application have been published in earlier work, in this paper we reflect on a generalized measuring method for blockchain-enabled applications which may in turn lead to a general methodology for testing cloud-based system performance and scalability using blockchain. Response time and transaction throughput metrics are collected for the blockchain implementation against the non-blockchain implementation and some conclusions are drawn about the additional resources that a blockchain architecture for a groupware collaboration application impose

    The Role of Cryptography in Security for Electronic Commerce

    Get PDF
    Many businesses and consumers are wary of conducting business over the Internet due to a perceived lack of security. Electronic business is subject to a variety of threats such as unauthorised access, misappropriation, alteration and destruction of both data and systems. This paper explores the major security concerns of businesses and users and describes the cryptographic techniques used to reduce such risks

    Profiling through a digital mobile device

    Get PDF
    Mobile digital devices have evolved from telecommunications device to a lifestyle product over the years. These devices are used in all aspects of our daily life. As a result, more information is stored within the devices. Unprotected mobile digital device is susceptible to privacy invasion attack when the device falls into the wrong hand of any unscrupulous third party. The main objective of this paper is to provide an implication analysis on the possible risks of information leakage through digital mobile devices, in the case when users forget to, or choose never to apply any security protection to their device

    A Review on Cloud Data Security Challenges and existing Countermeasures in Cloud Computing

    Get PDF
    Cloud computing (CC) is among the most rapidly evolving computer technologies. That is the required accessibility of network assets, mainly information storage with processing authority without the requirement for particular and direct user administration. CC is a collection of public and private data centers that provide a single platform for clients throughout the Internet. The growing volume of personal and sensitive information acquired through supervisory authorities demands the usage of the cloud not just for information storage and for data processing at cloud assets. Nevertheless, due to safety issues raised by recent data leaks, it is recommended that unprotected sensitive data not be sent to public clouds. This document provides a detailed appraisal of the research regarding data protection and privacy problems, data encrypting, and data obfuscation, including remedies for cloud data storage. The most up-to-date technologies and approaches for cloud data security are examined. This research also examines several current strategies for addressing cloud security concerns. The performance of each approach is then compared based on its characteristics, benefits, and shortcomings. Finally, go at a few active cloud storage data security study fields

    LEVERAGING PRIVATE DATA FOR PUBLIC GOOD: A Descriptive Analysis and Typology of Existing Practices

    Get PDF
    To address the challenges of our times, we need both new solutions and new ways to develop those solutions. Data will play a central role in this process. Yet, much of the most useful, timely and comprehensive data that could help transform the way we make decisions or solve public problems resides with the private sector in the form of call detail records, online purchases, sensor data, social media data, and other assets. If we truly want to harness the potential of data to improve people's lives, we need to understand and find ways to unlock and re-use this private data for public good.In what follows, we analyze the current practice of "data collaboratives," an emerging form of collaboration in which a private-sector entity's data is leveraged in partnership with other entities from the public sector, civil society or academia for public good. The GovLab coined the term "data collaborative" in 2015.The potential and realized contributions of data collaboratives stem from how the supply of and demand for data are widely dispersed—spread across government, the private sector, and civil society—and often poorly matched. While most commentary on the data era's shortcomings focuses on the potential misuse of data, one of the key challenges of our data age actually lies in a persistent failure to re-use data responsibly for public good. This failure results in tremendous inefficiencies and lost potential.Data collaboratives, when designed responsibly, are key to addressing this shortcoming. They draw together otherwise siloed data and a dispersed range of expertise, matching supply and demand and ensuring that relevant institutions and individuals are using and analyzing data in ways that maximize the possibility of new, innovative social solutions.While we have seen an uptake in normative discussions on how data should be shared, little analysis exists of the actual practice. Over the last few years, we have identified, curated and documented more than 150 data collaboratives deployed around the world to address societal challenges as varied as urban mobility, public health, and corruption. These cases are stored on our Data Collaboratives Explorer, the largest such repository on the topic.This paper seeks to answer the central question: What institutional arrangements and operational dynamics enable private-sector data holders to collaborate with external parties to create new public value
    • …
    corecore