Search results

1 – 10 of over 176000
Article
Publication date: 19 May 2022

Priyanka Kumari Bhansali, Dilendra Hiran, Hemant Kothari and Kamal Gulati

The purpose of this paper Computing is a recent emerging cloud model that affords clients limitless facilities, lowers the rate of customer storing and computation and…

Abstract

Purpose

The purpose of this paper Computing is a recent emerging cloud model that affords clients limitless facilities, lowers the rate of customer storing and computation and progresses the ease of use, leading to a surge in the number of enterprises and individuals storing data in the cloud. Cloud services are used by various organizations (education, medical and commercial) to store their data. In the health-care industry, for example, patient medical data is outsourced to a cloud server. Instead of relying onmedical service providers, clients can access theirmedical data over the cloud.

Design/methodology/approach

This section explains the proposed cloud-based health-care system for secure data storage and access control called hash-based ciphertext policy attribute-based encryption with signature (hCP-ABES). It provides access control with finer granularity, security, authentication and user confidentiality of medical data. It enhances ciphertext-policy attribute-based encryption (CP-ABE) with hashing, encryption and signature. The proposed architecture includes protection mechanisms to guarantee that health-care and medical information can be securely exchanged between health systems via the cloud. Figure 2 depicts the proposed work's architectural design.

Findings

For health-care-related applications, safe contact with common documents hosted on a cloud server is becoming increasingly important. However, there are numerous constraints to designing an effective and safe data access method, including cloud server performance, a high number of data users and various security requirements. This work adds hashing and signature to the classic CP-ABE technique. It protects the confidentiality of health-care data while also allowing for fine-grained access control. According to an analysis of security needs, this work fulfills the privacy and integrity of health information using federated learning.

Originality/value

The Internet of Things (IoT) technology and smart diagnostic implants have enhanced health-care systems by allowing for remote access and screening of patients’ health issues at any time and from any location. Medical IoT devices monitor patients’ health status and combine this information into medical records, which are then transferred to the cloud and viewed by health providers for decision-making. However, when it comes to information transfer, the security and secrecy of electronic health records become a major concern. This work offers effective data storage and access control for a smart healthcare system to protect confidentiality. CP-ABE ensures data confidentiality and also allows control on data access at a finer level. Furthermore, it allows owners to set up a dynamic patients health data sharing policy under the cloud layer. hCP-ABES proposed fine-grained data access, security, authentication and user privacy of medical data. This paper enhances CP-ABE with hashing, encryption and signature. The proposed method has been evaluated, and the results signify that the proposed hCP-ABES is feasible compared to other access control schemes using federated learning.

Details

International Journal of Pervasive Computing and Communications, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1742-7371

Keywords

Article
Publication date: 1 March 2022

K. Madhura and R. Mahalakshmi

The blockchain system is required for coordinating and managing the information across the organizations. The internal assurance of the information system is under threat…

Abstract

Purpose

The blockchain system is required for coordinating and managing the information across the organizations. The internal assurance of the information system is under threat and requires a defined and arbitrary system for protective information sharing. The primary analysis of defining and providing the access to the data or information is proposed in this article. The major challenge faced by organizations is providing and maintaining security to the cumulated data infrastructure, protecting the confidential data flow within the infrastructure and to ascertain ethical operations within the organization.

Design/methodology/approach

In this paper, a top-down approach is utilized to solve the issues faced during confidential data storage, track and alert internal malignant access. The web content management system (WCMS) market is growing and the challenging desideratum of solving security issues are incrementing. This research proposes a top-down security implementation methodology which alters the access control of the organization running the WCMS, it is a highly secure access-control with activity tracker that records who did what activity and who is responsible for malignant access tracker.

Findings

The upgraded access control system is implemented utilizing the most influential blockchain technology where the hash engendered by the Inter Planetary File System (IPFS) cloud is stored on the block to implement a confidential data tracker; a supplemental level of security is integrated to the admin by verifying its account ID by storing it on to the astute contracts and applying two-step authentication. A caliber of security is integrated during storage by integrating RHS encryption.

Research limitations/implications

This system is proposed for the confidential student data storage (for e.g. educational documents, marks cards etc.) and tracking maleficent access.

Originality/value

The upgraded access control system is implemented using the most influential blockchain technology where the hash generated by the IPFS cloud is stored on the block to implement a confidential data tracker, an additional level of security is added to the admin by verifying its account ID by storing it on to the smart contracts and applying two-step authentication.

Details

International Journal of Intelligent Computing and Cybernetics, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1756-378X

Keywords

Article
Publication date: 30 July 2021

Tanvi Garg, Navid Kagalwalla, Shubha Puthran, Prathamesh Churi and Ambika Pawar

This paper aims to design a secure and seamless system that ensures quick sharing of health-care data to improve the privacy of sensitive health-care data, the efficiency…

Abstract

Purpose

This paper aims to design a secure and seamless system that ensures quick sharing of health-care data to improve the privacy of sensitive health-care data, the efficiency of health-care infrastructure, effective treatment given to patients and encourage the development of new health-care technologies by researchers. These objectives are achieved through the proposed system, a “privacy-aware data tagging system using role-based access control for health-care data.”

Design/methodology/approach

Health-care data must be stored and shared in such a manner that the privacy of the patient is maintained. The method proposed, uses data tags to classify health-care data into various color codes which signify the sensitivity of data. It makes use of the ARX tool to anonymize raw health-care data and uses role-based access control as a means of ensuring only authenticated persons can access the data.

Findings

The system integrates the tagging and anonymizing of health-care data coupled with robust access control policies into one architecture. The paper discusses the proposed architecture, describes the algorithm used to tag health-care data, analyzes the metrics of the anonymized data against various attacks and devises a mathematical model for role-based access control.

Originality/value

The paper integrates three disparate topics – data tagging, anonymization and role-based access policies into one seamless architecture. Codifying health-care data into different tags based on International Classification of Diseases 10th Revision (ICD-10) codes and applying varying levels of anonymization for each data tag along with role-based access policies is unique to the system and also ensures the usability of data for research.

Details

World Journal of Engineering, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1708-5284

Keywords

Article
Publication date: 15 January 2019

Spyros E. Polykalas and George N. Prezerakos

Mobile devices (smartphones, tables etc.) have become the de facto means of accessing the internet. While traditional Web browsing is still quite popular, significant…

2671

Abstract

Purpose

Mobile devices (smartphones, tables etc.) have become the de facto means of accessing the internet. While traditional Web browsing is still quite popular, significant interaction takes place via native mobile apps that can be downloaded either freely or at a cost. This has opened the door to a number of issues related to privacy protection since the smartphone stores and processes personal data. The purpose of this paper is to examine the extent of access to personal data, required by the most popular mobile apps available in Google Play store. In addition, it is examined whether the relevant procedure is in accordance with the provisions of the new EU Regulation.

Design/methodology/approach

The paper examines more than a thousand mobile apps, available from the Google Play store, with respect to the extent of the requests for access to personal data. In particular, for each available category in Google Play store, the most popular mobile apps have been examined both for free and paid apps. In addition, the permissions required by free and paid mobile apps are compared. Furthermore, a correlation analysis is carried out aiming to reveal any correlation between the extent of required access to personal data and the popularity and the rating of each mobile app.

Findings

The findings of this paper suggest that the majority of examined mobile apps require access to personal data to a high extent. In addition, it is found that free mobile apps request access to personal data in a higher extent compared to the relevant requests by paid apps, which indicates strongly that the business model of free mobile apps is based on personal data exploitation. The most popular types of access permissions are revealed for both free and paid apps. In addition, important questions are raised in relation to user awareness and behavior, data minimization and purpose limitation for free and paid mobile apps.

Originality/value

In this study, the process and the extent of access to personal data through mobile apps are analyzed. Although several studies analyzed relevant issues in the past, the originality of this research is mainly based on the following facts: first, this work took into account the recent Regulation of the EU in relation to personal data (GDPR); second, the authors analyzed a high number of the most popular mobile apps (more than a thousand); and third, the authors compare and analyze the different approaches followed between free and paid mobile apps.

Details

Digital Policy, Regulation and Governance, vol. 21 no. 2
Type: Research Article
ISSN: 2398-5038

Keywords

Article
Publication date: 1 February 1992

Alice Robbin

The purpose of this article is to contribute to our stock of knowledge about who uses networks, how they are used, and what contribution the networks make to advancing the…

Abstract

The purpose of this article is to contribute to our stock of knowledge about who uses networks, how they are used, and what contribution the networks make to advancing the scientific enterprise. Between 1985 and 1990, the Survey of Income and Program Participation (SIPP) ACCESS data facility at the University of Wisconsin‐Madison provided social scientists in the United States and elsewhere with access through the electronic networks to complex and dynamic statistical data; the 1984 SIPP is a longitudinal panel survey designed to examine economic well‐being in the United States. This article describes the conceptual framework and design of SIPP ACCESS; examines how network users communicated with the SIPP ACCESS project staff about the SIPP data; and evaluates one outcome derived from the communications, the improvement of the quality of the SIPP data. The direct and indirect benefits to social scientists of electronic networks are discussed. The author concludes with a series of policy recommendations that link the assessment of our inadequate knowledge base for evaluating how electronic networks advance the scientific enterprise and the SIPP ACCESS research network experience to the policy initiatives of the High Performance Computing Act of 1991 (P.L. 102–194) and the related extensive recommendations embodied in Grand Challenges 1993 High Performance Computing and Communications (The FY 1993 U.S. Research and Development Program).

Details

Internet Research, vol. 2 no. 2
Type: Research Article
ISSN: 1066-2243

Article
Publication date: 1 January 1995

Each of the agencies participating in GCDIS will play a role appropriate to its agency mission and consistent with the funds available to it. Descriptions of each agency's…

Abstract

Each of the agencies participating in GCDIS will play a role appropriate to its agency mission and consistent with the funds available to it. Descriptions of each agency's resources follow. Each agency will implement the GCDIS at its own pace.

Details

Library Hi Tech, vol. 13 no. 1/2
Type: Research Article
ISSN: 0737-8831

Book part
Publication date: 28 June 1991

Karen Horny

Abstract

Details

Library Technical Services: Operations and Management
Type: Book
ISBN: 978-1-84950-795-0

Article
Publication date: 17 October 2022

Angela Murphy and Alison Ollerenshaw

The impact of innovative web portals on users, from access to application, is gaining interest as the global call for increased data availability gains momentum. This…

Abstract

Purpose

The impact of innovative web portals on users, from access to application, is gaining interest as the global call for increased data availability gains momentum. This study reports on the perceptions of portal end users about usage and access to digital data across a range of fields of practice.

Design/methodology/approach

Data were collected and analysed from interviews (n = 132) and email feedback (n = 235) from end users of interoperable spatial knowledge web portals.

Findings

Data reveal that users attribute importance to ease of access and applicability, and to confidence and trust in data. The acquisition of data assists with reducing knowledge silos, facilitates knowledge sharing and decision-making. Digital data portals enable the building of stronger collaborations between different groups of individuals and communities leading to improved outcomes and more positive developments across varied discipline and practice areas.

Practical implications

Recommendations for developing online portals to optimise knowledge transfer and associated benefits, for users, are offered.

Originality/value

By collecting extensive qualitative data drawn from the experiences of end users of digital data portals, this paper provides new insights, thereby addressing a knowledge gap in the published literature about the use of technology uptake and the application of online data for practice and industry benefit.

Details

Online Information Review, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1468-4527

Keywords

Article
Publication date: 20 June 2016

Sarath Tomy and Eric Pardede

The purpose of this paper is to analyse the problem of privacy disclosure of third party applications in online social networks (OSNs) through Facebook, investigate the…

2158

Abstract

Purpose

The purpose of this paper is to analyse the problem of privacy disclosure of third party applications in online social networks (OSNs) through Facebook, investigate the limitations in the existing models to protect users privacy and propose a permission-based access control (PBAC) model, which gives users complete control over users’ data when accessing third party applications.

Design/methodology/approach

A practical model based on the defined permission policies is proposed to manage users information accessed by third party applications and improve user awareness in sharing sensitive information with them. This model is a combination of interfaces and internal mechanisms which can be adopted by any OSN having similar architecture to Facebook in managing third party applications, without much structural changes. The model implemented in Web interface connects with Facebook application programming interface and evaluates its efficacy using test cases.

Findings

The results show that the PBAC model can facilitate user awareness about privacy risks of data passed on to third party applications and allow users who are more concerned about their privacy from releasing such information to those applications.

Research limitations/implications

The study provides further research in protecting users’ privacy in OSNs and thus avoid the risks associated with that, thereby increasing users’ trust in using OSNs.

Originality/value

The research has proven to be useful in improving user awareness on the risk associated with sharing private information on OSNs, and the practically implemented PBAC model guarantees full user privacy from unwanted disclosure of personal information to third party applications.

Article
Publication date: 1 January 1994

Wendy Treadwell and James A. Cogswell

The University of Minnesota Libraries have established a full‐service information center to facilitate end‐user access to machine‐readable datafiles, particularly U.S…

Abstract

The University of Minnesota Libraries have established a full‐service information center to facilitate end‐user access to machine‐readable datafiles, particularly U.S. government datafiles such as the Census. The Machine Readable Data Center (MRDC), funded through a three‐year, $240,000 grant from the College Library Technology and Cooperation Grants Program (HEA Title II‐D), presents an alternative, library‐centered model for providing students, faculty, and independent researchers with direct access to machine‐readable data.

Details

Library Hi Tech, vol. 12 no. 1
Type: Research Article
ISSN: 0737-8831

1 – 10 of over 176000