Kliknij ten link, aby zobaczyć inne rodzaje publikacji na ten temat: Security and Privacy issues and its approaches.

Artykuły w czasopismach na temat „Security and Privacy issues and its approaches”

Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych

Wybierz rodzaj źródła:

Sprawdź 50 najlepszych artykułów w czasopismach naukowych na temat „Security and Privacy issues and its approaches”.

Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.

Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.

Przeglądaj artykuły w czasopismach z różnych dziedzin i twórz odpowiednie bibliografie.

1

Kanika*1, Alka Agrawal2 &. R.A. Khan3. "AN OVERVIEW OF PRIVACY PRESERVATION IN BIG DATA." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY 6, no. 7 (2017): 61–71. https://doi.org/10.5281/zenodo.822970.

Pełny tekst źródła
Streszczenie:
Mobile with mega pixel cameras, social networking sites, wireless sensor networks, earth-orbiting satellites, finance market etc continuously generating more and more data than ever before: 90% of world’s data has been produced in last two years. This huge amount of data is generated by different sources. Verification, authorization, authenticity, privacy such types of security issues is becoming major concern of big data in heterogeneous environments. To maintain the authenticity and preserve privacy of large amount of data is always an issue. In this paper authors discussed the data privacy
Style APA, Harvard, Vancouver, ISO itp.
2

Baig, Ahmed Fraz, and Sigurd Eskeland. "Security, Privacy, and Usability in Continuous Authentication: A Survey." Sensors 21, no. 17 (2021): 5967. http://dx.doi.org/10.3390/s21175967.

Pełny tekst źródła
Streszczenie:
Continuous authentication has been proposed as a possible approach for passive and seamless user authentication, using sensor data comprising biometric, behavioral, and context-oriented characteristics. Since these are personal data being transmitted and are outside the control of the user, this approach causes privacy issues. Continuous authentication has security challenges concerning poor matching rates and susceptibility of replay attacks. The security issues are mainly poor matching rates and the problems of replay attacks. In this survey, we present an overview of continuous authenticati
Style APA, Harvard, Vancouver, ISO itp.
3

Ramakrishnan, Mr R. "Privacy Challenges and Solutions in Big Data Analytics: A Comprehensive Review." International Journal for Research in Applied Science and Engineering Technology 12, no. 5 (2024): 2435–40. http://dx.doi.org/10.22214/ijraset.2024.62103.

Pełny tekst źródła
Streszczenie:
Abstract: Large data collections with a more intricate and diversified structure are referred to as "big data." These traits are typically associated with more challenges when it comes to storing, analyzing, and applying additional procedures or getting results. The technique of analyzing vast quantities of intricate data to uncover patterns or connections that are concealed is known as "big data analytics." Nonetheless, there is a clear conflict between big data's extensive use and its security and privacy. This paper examines privacy needs in big data, distinguishes between privacy and secur
Style APA, Harvard, Vancouver, ISO itp.
4

Mylavathi, G. A., N. M. Mallika, and K. Mohanraj. "Survey of Security and Privacy Issues in Big Data Analytics." Asian Journal of Computer Science and Technology 8, S1 (2019): 33–35. http://dx.doi.org/10.51983/ajcst-2019.8.s1.1972.

Pełny tekst źródła
Streszczenie:
Due to the reasons such as the rapid growth and spread of network services, mobile devices, and online users on the Internet leading to a remarkable increase in the amount of data. Almost each trade is making an attempt to address this large information. Big data phenomenon has begun to gain importance. However, it’s not solely terribly tough to store massive information and analyses them with ancient applications, however conjointly it’s difficult privacy and security issues. For this reason, this paper discusses the massive information, its scheme, considerations on massive information and p
Style APA, Harvard, Vancouver, ISO itp.
5

Abdulsalam, Yunusa Simpa, and Mustapha Hedabou. "Security and Privacy in Cloud Computing: Technical Review." Future Internet 14, no. 1 (2021): 11. http://dx.doi.org/10.3390/fi14010011.

Pełny tekst źródła
Streszczenie:
Advances in the usage of information and communication technologies (ICT) has given rise to the popularity and success of cloud computing. Cloud computing offers advantages and opportunities for business users to migrate and leverage the scalability of the pay-as-you-go price model. However, outsourcing information and business applications to the cloud or a third party raises security and privacy concerns, which have become critical in adopting cloud implementation and services. Researchers and affected organisations have proposed different security approaches in the literature to tackle the
Style APA, Harvard, Vancouver, ISO itp.
6

Tiwari,, Arun. "Security and Privacy Analysis in Internet of Things." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 08, no. 04 (2024): 1–5. http://dx.doi.org/10.55041/ijsrem31055.

Pełny tekst źródła
Streszczenie:
The concept of the Internet of Things (IoT) promises to make all electronic devices smart, connected and capable of functioning together seamlessly courtesy of a worldwide network that links virtual elements with physical ones. Every IoT item in this network has a unique identification number to indicate its position in this system. In addition, connectivity is important for effective coordination with some low-tech gadgets. In this chapter, we shall be discussing the relevant IoT systems and security issues related to them including privacy, security attacks, means of securing IoT environment
Style APA, Harvard, Vancouver, ISO itp.
7

Massis, Bruce. "The Internet of Things and its impact on the library." New Library World 117, no. 3/4 (2016): 289–92. http://dx.doi.org/10.1108/nlw-12-2015-0093.

Pełny tekst źródła
Streszczenie:
Purpose – The purpose of this paper is to consider the Internet of Things (IOT) and its potential impact on libraries. Design/methodology/approach – This paper presents a literature review and a commentary on this topic that have been addressed by professionals, researchers and practitioners. Findings – In communicating the issues when comprehending the scope of the IOT, libraries need not succumb to the sometimes near-hysteria that surrounds the rhetoric regarding security and privacy. But, librarians must actively engage in the conversation and its subsequent actions to respond to patrons wh
Style APA, Harvard, Vancouver, ISO itp.
8

Sivan, Remya, and Zuriati Ahmad Zukarnain. "Security and Privacy in Cloud-Based E-Health System." Symmetry 13, no. 5 (2021): 742. http://dx.doi.org/10.3390/sym13050742.

Pełny tekst źródła
Streszczenie:
Cloud based healthcare computing have changed the face of healthcare in many ways. The main advantages of cloud computing in healthcare are scalability of the required service and the provision to upscale or downsize the data storge, collaborating Artificial Intelligence (AI) and machine learning. The current paper examined various research studies to explore the utilization of intelligent techniques in health systems and mainly focused into the security and privacy issues in the current technologies. Despite the various benefits related to cloud-computing applications for healthcare, there ar
Style APA, Harvard, Vancouver, ISO itp.
9

Tareq, Imad, Bassant M. Elbagoury, Salsabil El-Regaily, and El-Sayed M. El-Horbaty. "A survey about deep learning and federated Learning in cyberse-curity." Periodicals of Engineering and Natural Sciences (PEN) 12, no. 1 (2024): 75–100. https://doi.org/10.21533/pen.v12.i1.23.

Pełny tekst źródła
Streszczenie:
Advances in Artificial Intelligence (AI) technology have led to the strengthening of traditional systems' cybersecurity capabilities in a variety of applications. However, these embedded machine learning models have exposed these systems to a new set of vulnerabilities known as AI assaults. These systems are now attractive targets for cyberattacks, jeopardizing the security and safety of bigger systems that include them. As a result, DL approaches are critical to transitioning network and system protection from providing safe communication between systems to intelligence systems in security. F
Style APA, Harvard, Vancouver, ISO itp.
10

Reddy, Manjunath, Nur Mohammad Ali Chisty, and Anusha Bodepudi. "A Review of Cybersecurity and Biometric Authentication in Cloud Network." Engineering International 10, no. 1 (2022): 9–18. http://dx.doi.org/10.18034/ei.v10i1.652.

Pełny tekst źródła
Streszczenie:
Cloud computing uses few resources to give customers complete distant services via the internet. Data privacy, security, and reliability are major issues with cloud computing. Security is the biggest issue. This study discusses the biometrics framework and safe cloud computing identity management method. This paper discusses cloud computing security challenges and reviews cloud access framework approaches. It describes a novel fingerprint access-based authentication system to protect cloud services from DOS and DDoS attacks. This biometrics-based system can secure cloud services from illegal a
Style APA, Harvard, Vancouver, ISO itp.
11

Misbah Kousar. "Design of a Decentralized Authentication and Off-Chain Data Management Protocol for VANETs Using Blockchain." Communications on Applied Nonlinear Analysis 32, no. 2 (2024): 718–31. http://dx.doi.org/10.52783/cana.v32.1917.

Pełny tekst źródła
Streszczenie:
In the evolving landscape of Intelligent Transportation Systems (ITS), the need for secure and reliable data sharing is more critical than ever. As ITS increasingly rely on the exchange of sensitive information, challenges related to data privacy, security, and the integrity of communication have emerged. Traditional approaches to securing vehicular networks often depend on centralized Trusted Third Parties (TTP) and cloud-based infrastructure, which introduce vulnerabilities such as single points of failure and potential latency issues. This paper proposes a novel decentralized architecture f
Style APA, Harvard, Vancouver, ISO itp.
12

Mumtaz, Rusul, Venus Samawi, Aysh Alhroob, Wael Alzyadat, and Ikhlas Almukahel. "PDIS: A Service Layer for Privacy and Detecting Intrusions in Cloud Computing." International Journal of Advances in Soft Computing and its Applications 14, no. 2 (2022): 15–35. http://dx.doi.org/10.15849/ijasca.220720.02.

Pełny tekst źródła
Streszczenie:
Cloud computing faces numerous challenges in many areas including security and privacy issues. In this work, a developed approach is suggested to tackle three security and privacy issues: network intrusion detection (NID), privacy, and internal attacks. A decision tree (J48) has been used to generate a set of rules based on the CICIDS2017 dataset to solve the NID problem. The accuracy of the generated rules approaches 99.8%. A set of policies are attached to the data file on the bases of a sticky policy to preserve privacy. A new approach is suggested based on blockchain to detect internal att
Style APA, Harvard, Vancouver, ISO itp.
13

El-Attar, Noha E., Doaa S. El-Morshedy, and Wael A. Awad. "A New Hybrid Automated Security Framework to Cloud Storage System." Cryptography 5, no. 4 (2021): 37. http://dx.doi.org/10.3390/cryptography5040037.

Pełny tekst źródła
Streszczenie:
The need for cloud storage grows day after day due to its reliable and scalable nature. The storage and maintenance of user data at a remote location are severe issues due to the difficulty of ensuring data privacy and confidentiality. Some security issues within current cloud systems are managed by a cloud third party (CTP), who may turn into an untrustworthy insider part. This paper presents an automated Encryption/Decryption System for Cloud Data Storage (AEDS) based on hybrid cryptography algorithms to improve data security and ensure confidentiality without interference from CTP. Three en
Style APA, Harvard, Vancouver, ISO itp.
14

Adnan Darwish, Marwan, Eiad Yafi, Abdullah H. Almasri, and Megat F Zuhairi. "Privacy and Security of Cloud Computing: A Comprehensive Review of Techniques and Challenges." International Journal of Engineering & Technology 7, no. 4.29 (2018): 240–47. http://dx.doi.org/10.14419/ijet.v7i4.29.26263.

Pełny tekst źródła
Streszczenie:
Cloud computing usage is rapidly increasing in a various range of services and it is seen on trend to revolutionize the way the IT companies doing businesses. The recent advances in mobile, social media companies and online businesses have given rise to success and propagation for the environment of the cloud. However, When uploading the users' data from the local device to the nature of the cloud that considered as a third party , major challenges cloud-computing model jeopardizes privacy and security issues and threats on data security and reliability. These threats constitute data breaches,
Style APA, Harvard, Vancouver, ISO itp.
15

V., Maheshwari, and Prasanna M. "The impact of security and privacy threat modeling on blockchain-enabled-electronic voting system." Applied and Computational Engineering 6, no. 1 (2023): 306–11. http://dx.doi.org/10.54254/2755-2721/6/20230797.

Pełny tekst źródła
Streszczenie:
Blockchain is a decentralized, distributed ledger that records transactions between two parties. A blockchain-based software system is a new and innovative approach to software engineering that uses blockchain technology. This approach has several advantages over traditional software engineering approaches, including improved security and transparency. The most common software engineering approaches are waterfall, agile and hybrid models. Each of these has its strengths and weakness. A blockchain-based system has the advantage of being more secure and transparent than any of these approaches.
Style APA, Harvard, Vancouver, ISO itp.
16

Eze, Kelechi G., Cajetan M. Akujuobi, Shermar Hunter, Shumon ,. Alam, Sarhan Musa, and Justin Foreman. "A Blockchain-based Security Architecture for the Internet of Things." WSEAS TRANSACTIONS ON INFORMATION SCIENCE AND APPLICATIONS 19 (March 23, 2022): 12–22. http://dx.doi.org/10.37394/23209.2022.19.2.

Pełny tekst źródła
Streszczenie:
The Internet of Things (IoT) is growing at a very fast pace and being increasingly adopted in many scenarios of industrial applications such as energy (smart grid), automobile (smart cars), healthcare (smart healthcare), manufacturing (smart manufacturing and supply chain) and other application such as homes (smart home) and cities (smart city). Nonetheless, these IoT technologies (devices, systems, protocols, and applications) are faced with many security-related issues. IoT Systems have different layers that are vulnerable to various kinds of attacks. To defend against these attacks, one mus
Style APA, Harvard, Vancouver, ISO itp.
17

Khan, Muhammad Ayaz, Subhan Ullah, Tahir Ahmad, Khwaja Jawad, and Attaullah Buriro. "Enhancing Security and Privacy in Healthcare Systems Using a Lightweight RFID Protocol." Sensors 23, no. 12 (2023): 5518. http://dx.doi.org/10.3390/s23125518.

Pełny tekst źródła
Streszczenie:
Exploiting Radio Frequency Identification (RFID) technology in healthcare systems has become a common practice, as it ensures better patient care and safety. However, these systems are prone to security vulnerabilities that can jeopardize patient privacy and the secure management of patient credentials. This paper aims to advance state-of-the-art approaches by developing more secure and private RFID-based healthcare systems. More specifically, we propose a lightweight RFID protocol that safeguards patients’ privacy in the Internet of Healthcare Things (IoHT) domain by utilizing pseudonyms inst
Style APA, Harvard, Vancouver, ISO itp.
18

Renjith, E. Jeslin. "Revolutionizing Cloud Security: Innovative Approaches for Safeguarding Data Integrity." FMDB Transactions on Sustainable Computer Letters 2, no. 2 (2024): 111–19. http://dx.doi.org/10.69888/ftscl.2024.000185.

Pełny tekst źródła
Streszczenie:
Cloud computing uses third-party servers or private clouds to provide online services and on-demand enterprise resource access. Microsoft Azure, Amazon, IBM, and Google Apps allow customers to design and run cloud-based apps from anywhere. These cloud services store and retrieve data from faraway servers, highlighting the importance of security due to internet data transfer. Before using cloud computing, firms must handle security issues. Pay-per-use, self-service, and scalability make the model popular in banking, healthcare, retail, education, manufacturing, and business. Pay-per-use models
Style APA, Harvard, Vancouver, ISO itp.
19

Rahman, Wan Fariza Wan Abdul, Aisha Hassan Abdalla, and Md Rafiqul Islam. "The Proposed Framework and Challenges towards Smart City Implementation." Journal of Physics: Conference Series 2084, no. 1 (2021): 012025. http://dx.doi.org/10.1088/1742-6596/2084/1/012025.

Pełny tekst źródła
Streszczenie:
Abstract The recent increment of population in the urban areas requires well-operated and well-managed cities with lots of automation in various aspects of everyday life. The backbone of this smart city is the Internet-of-Things (IoT) technology. This paper outlines the fundamental idea of IoT, followed by its framework for successful smart city implementation. The deployment of a city-scale IoT infrastructure involves heterogeneity of devices (in terms of hardware, software interfaces, communication interfaces and data transmitted), poses new challenges in several aspects including interopera
Style APA, Harvard, Vancouver, ISO itp.
20

W., Sakpere,, Odetunde, A. I., and Ibekwe ,. E. C. "Policing the Cyberspace: Jurisprudential Approaches." African Journal of Law, Political Research and Administration 8, no. 1 (2025): 125–35. https://doi.org/10.52589/ajlpra-14s5ukgt.

Pełny tekst źródła
Streszczenie:
The study, Policing the Cyberspace: Cyber Jurisprudential Approaches, studies complex tasks and legal measures needed for governing an informational environment. Given that cyberspace is currently a hotbed of crime including hacking, ransomware, and fraud among others the paper explores how legal concepts can be used to address transnational crime. Employing a qualitative methodology that includes analysis of academic literature, legal rulings, and case studies, the research addresses four key questions: opportunities and challenges in the development of legal frameworks, and potential issues
Style APA, Harvard, Vancouver, ISO itp.
21

Papamartzivanos, Dimitrios, Sofia Anna Menesidou, Panagiotis Gouvas, and Thanassis Giannetsos. "A Perfect Match: Converging and Automating Privacy and Security Impact Assessment On-the-Fly." Future Internet 13, no. 2 (2021): 30. http://dx.doi.org/10.3390/fi13020030.

Pełny tekst źródła
Streszczenie:
As the upsurge of information and communication technologies has become the foundation of all modern application domains, fueled by the unprecedented amount of data being processed and exchanged, besides security concerns, there are also pressing privacy considerations that come into play. Compounding this issue, there is currently a documented gap between the cybersecurity and privacy risk assessment (RA) avenues, which are treated as distinct management processes and capitalise on rather rigid and make-like approaches. In this paper, we aim to combine the best of both worlds by proposing the
Style APA, Harvard, Vancouver, ISO itp.
22

Barakat, Ghena, Luca D’agati, Giuseppe Tricomi, Francesco Longo, Antonio Puliafito, and Giovanni Merlino. "Discrete Event Modeling and Simulation Approaches for IIoT." WSEAS TRANSACTIONS ON BUSINESS AND ECONOMICS 21 (December 6, 2024): 2456–63. https://doi.org/10.37394/23207.2024.21.202.

Pełny tekst źródła
Streszczenie:
The industry has experienced significant advancements in recent years, primarily focusing on smart manufacturing, culminating in the Industry 4.0 (I4.0) revolution I4.0 emphasizes interconnectivity, real time data capture and transmission among machines, autonomy, and machine learning, providing manufacturing companies numerous growth opportunities. The Industrial Internet of Things (IIoT) is a core component of this revolution, becoming integral to each system and increasing complexity due to the vast number of interconnected devices and diverse physical components. The variety of virtual ser
Style APA, Harvard, Vancouver, ISO itp.
23

Ferrara, Pietro, Luca Olivieri, and Fausto Spoto. "Static Privacy Analysis by Flow Reconstruction of Tainted Data." International Journal of Software Engineering and Knowledge Engineering 31, no. 07 (2021): 973–1016. http://dx.doi.org/10.1142/s0218194021500303.

Pełny tekst źródła
Streszczenie:
Software security vulnerabilities and leakages of private information are two of the main issues in modern software systems. Several different approaches, ranging from design techniques to run-time monitoring, have been applied to prevent, detect and isolate such vulnerabilities. Static taint analysis has been particularly successful in detecting injection vulnerabilities at compile time. However, its extension to detect leakages of sensitive data has been only partially investigated. In this paper, we introduce BackFlow, a backward flow reconstructor that, starting from the results of a gener
Style APA, Harvard, Vancouver, ISO itp.
24

Kanthavel, R. "Review on Data Securing Techniques for Internet of Medical Things." September 2021 3, no. 3 (2021): 177–91. http://dx.doi.org/10.36548/jscp.2021.3.004.

Pełny tekst źródła
Streszczenie:
In recent days Internet of Things (IOT) has grown up dramatically. It has wide range of applications. One of its applications is Health care system. IOT helps in managing and optimizing of healthcare system. Though it helps in all ways it also brings security problem in account. There is lot of privacy issues aroused due to IOT. In some cases it leads to risk the patient’s life. To overcome this issue we need an architecture named Internet of Medical Things (IOMT). In this paper we have discussed the problems faced by healthcare system and the authentication approaches used by Internet of Medi
Style APA, Harvard, Vancouver, ISO itp.
25

Algarni, Sultan, Fathy Eassa, Khalid Almarhabi, et al. "Blockchain-Based Secured Access Control in an IoT System." Applied Sciences 11, no. 4 (2021): 1772. http://dx.doi.org/10.3390/app11041772.

Pełny tekst źródła
Streszczenie:
The distributed nature of Internet of Things (IoT) and its rapid increase on a large scale raises many security and privacy issues. Access control is one of the major challenges currently addressed through centralized approaches that may rely on a third party and they are constrained by availability and scalability, which may result in a performance bottleneck. Therefore, this paper proposes a novel solution to manage the delivery of lightweight and decentralized secure access control of an IoT system based on a multi-agent system and a blockchain. The main objective of the proposed solution i
Style APA, Harvard, Vancouver, ISO itp.
26

Kolmahin, Danil, and Anatoliy Sergiyenko. "Combining Pretty Good Privacy and Role-Based Access Control Technologies for Access Protection to Confidential Data." Information, Computing and Intelligent systems, no. 4 (October 2, 2024): 69–78. http://dx.doi.org/10.20535/2786-8729.4.2024.305130.

Pełny tekst źródła
Streszczenie:
This article presents a granular access protection model for confidential information, combining PGP (Pretty Good Privacy) and RBAC (Role-Based Access Control) technologies. The aim of the research is to develop and justify a model that ensures a high level of security through efficient data encryption and flexible role-based access management. The article examines the research objects, which include modern information systems processing confidential data, and the subject of the study, which encompasses encryption and access control methods. To achieve the stated goal, an analysis of modern ap
Style APA, Harvard, Vancouver, ISO itp.
27

Mugonza, Robert1 and Basaza-Ejiri. H. Annabella2Mugonza Robert1 and Basaza-Ejiri. H. Annabella2. "A HEALTH RESEARCH COLLABORATION CLOUD ARCHITECTURE." International Journal on Cloud Computing: Services and Architecture (IJCCSA) 8, no. 1/2/3/4/5 (2023): 23. https://doi.org/10.5281/zenodo.7568321.

Pełny tekst źródła
Streszczenie:
Cloud computing platforms used for research collaborations within public health domains are limited in terms of how service components are organized and provisioned. This challenge is intensified by platform level challenges of transparency, confidentiality, privacy and trust. Addressing these collaboration issues will necessitate that components are reorganized. There is a need for secure and efficient approaches of reorganizing the service components, with trust to support collaboration related requirements. Through iterative design, a reliable and trust-aware re-organization of cloud compon
Style APA, Harvard, Vancouver, ISO itp.
28

Mugonza, Robert1 and Basaza-Ejiri. H. Annabella2. "A HEALTH RESEARCH COLLABORATION CLOUD ARCHITECTURE." International Journal on Cloud Computing: Services and Architecture (IJCCSA) 8, no. 1/2/3/4/5 (2018): 01–16. https://doi.org/10.5281/zenodo.1489020.

Pełny tekst źródła
Streszczenie:
Cloud computing platforms used for research collaborations within public health domains are limited in terms of how service components are organized and provisioned. This challenge is intensified by platform level challenges of transparency, confidentiality, privacy and trust. Addressing these collaboration issues will necessitate that components are reorganized. There is a need for secure and efficient approaches of reorganizing the service components, with trust to support collaboration related requirements. Through iterative design, a reliable and trust-aware re-organization of cloud compon
Style APA, Harvard, Vancouver, ISO itp.
29

Prasadhini, D. Hari, Harini R, and R. Jerushaa Michelle. "Blockchain-Enabled IoT: Enabling Trust and Security in a Connected World." International Journal for Research in Applied Science and Engineering Technology 11, no. 5 (2023): 2631–34. http://dx.doi.org/10.22214/ijraset.2023.52051.

Pełny tekst źródła
Streszczenie:
Abstract: Blockchain technology has gained significant attention for its potential applications in the Internet of Things (IoT) realm. By combining blockchain with IoT, a new paradigm emerges that offers enhanced security, transparency, and trustin IoT networks. In the context of IoT, a blockchain serves as a decentralised and immutable ledger that records all transactions and interactions among connected devices. This decentralisednature eliminates the need for a central authority, ensuring that data exchanges and smart contract executions occur in a transparent and tamper-proof manner. Block
Style APA, Harvard, Vancouver, ISO itp.
30

Prabhdeep Singh and Ashish Kumar Pandey. "A Review on Cloud Data Security Challenges and existing Countermeasures in Cloud Computing." International Journal of Data Informatics and Intelligent Computing 1, no. 2 (2022): 23–33. http://dx.doi.org/10.59461/ijdiic.v1i2.33.

Pełny tekst źródła
Streszczenie:
Cloud computing (CC) is among the most rapidly evolving computer technologies. That is the required accessibility of network assets, mainly information storage with processing authority without the requirement for particular and direct user administration. CC is a collection of public and private data centers that provide a single platform for clients throughout the Internet. The growing volume of personal and sensitive information acquired through supervisory authorities demands the usage of the cloud not just for information storage and for data processing at cloud assets. Nevertheless, due
Style APA, Harvard, Vancouver, ISO itp.
31

Viswanadham, Yedida Venkata Rama Subramanya, and Kayalvizhi Jayavel. "A Framework for Data Privacy Preserving in Supply Chain Management Using Hybrid Meta-Heuristic Algorithm with Ethereum Blockchain Technology." Electronics 12, no. 6 (2023): 1404. http://dx.doi.org/10.3390/electronics12061404.

Pełny tekst źródła
Streszczenie:
Blockchain is a recently developed advanced technology. It has been assisted by a lot of interest in a decentralized and distributed public ledger system integrated as a peer-to-peer network. A tamper-proof digital framework is created for sharing and storing data, where the linked block structure is utilized to verify and store the data. A trusted consensus method has been adopted to synchronize the changes in the original data. However, it is challenging for Ethereum to maintain security at all blockchain levels. As such, “public–private key cryptography” can be utilized to provide privacy o
Style APA, Harvard, Vancouver, ISO itp.
32

Jayasinghe, Upul, Gyu Myoung Lee, Áine MacDermott, and Woo Seop Rhee. "TrustChain: A Privacy Preserving Blockchain with Edge Computing." Wireless Communications and Mobile Computing 2019 (July 8, 2019): 1–17. http://dx.doi.org/10.1155/2019/2014697.

Pełny tekst źródła
Streszczenie:
Recent advancements in the Internet of Things (IoT) has enabled the collection, processing, and analysis of various forms of data including the personal data from billions of objects to generate valuable knowledge, making more innovative services for its stakeholders. Yet, this paradigm continuously suffers from numerous security and privacy concerns mainly due to its massive scale, distributed nature, and scarcity of resources towards the edge of IoT networks. Interestingly, blockchain based techniques offer strong countermeasures to protect data from tampering while supporting the distribute
Style APA, Harvard, Vancouver, ISO itp.
33

Ahmad, Ahsan, Aftab Tariq, Hafiz Khawar Hussain, and Ahmad Yousaf Gill. "Revolutionizing Healthcare: How Deep Learning is poised to Change the Landscape of Medical Diagnosis and Treatment." Journal of Computer Networks, Architecture and High Performance Computing 5, no. 2 (2023): 458–71. http://dx.doi.org/10.47709/cnahpc.v5i2.2350.

Pełny tekst źródła
Streszczenie:
Deep learning has become a significant tool in the healthcare industry with the potential to change the way care is provided and enhance patient outcomes. With a focus on personalised medicine, ethical issues and problems, future directions and opportunities, real-world case studies, and data privacy and security, this review article investigates the existing and potential applications of deep learning in healthcare. Deep learning in personalised medicine holds enormous promise for improving patient care by enabling more precise diagnoses and individualised treatment approaches. But it's impor
Style APA, Harvard, Vancouver, ISO itp.
34

Wang, Yongchao. "Federated Learning Applications in Fingerprint and Finger Vein Recognition." ITM Web of Conferences 70 (2025): 01023. https://doi.org/10.1051/itmconf/20257001023.

Pełny tekst źródła
Streszczenie:
Fingerprints and finger veins are widely used in security identification in many fields due to their uniqueness and identifiability. However, their privacy issues are often criticized. This article summarizes several approaches that combine federated learning with fingerprint and finger vein recognition to solve privacy issues. One of the frameworks for fingerprint recognition, Federated Learning-Fingerprint Recognition, uses sparse representation techniques such as the Discrete Cosine Transform for data preprocessing. The framework also references the ResNet18 model and reservoir sampling so
Style APA, Harvard, Vancouver, ISO itp.
35

Morales-Alarcón, Cristian Hugo, Elba Bodero-Poveda, Henry Mauricio Villa-Yánez, and Pamela Alexandra Buñay-Guisñan. "Blockchain and Its Application in the Peer Review of Scientific Works: A Systematic Review." Publications 12, no. 4 (2024): 40. http://dx.doi.org/10.3390/publications12040040.

Pełny tekst źródła
Streszczenie:
Blockchain is a distributed ledger technology that ensures the security and transparency of data, guaranteeing that they cannot be altered. Its application in the peer review of scientific papers can contribute to improving the integrity, transparency, and efficiency of the process, mitigating issues of manipulation and fraud. This work analyzes the contributions of various research studies that address the use of blockchain technology in peer review. The study is a systematic literature review (SLR) in which the PRISMA methodology was applied. Fifty primary studies were identified through sea
Style APA, Harvard, Vancouver, ISO itp.
36

Shinde1, Aditya S. "Multi-Factor Authentication: A Comprehensive Review." INTERNATIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 06 (2025): 1–9. https://doi.org/10.55041/ijsrem50831.

Pełny tekst źródła
Streszczenie:
Multi-factor authentication (MFA) has become a fundamental security measure in modern information systems, significantly reducing the risk of unauthorized access. This paper reviews current literature, standards, and best practices to evaluate the effectiveness, implementation challenges, and future directions of MFA. MFA works by requiring two or more distinct credentials—such as knowledge (passwords), possession (tokens), or inherence (biometrics)—making it far more resilient than single-factor methods. Despite its security benefits, MFA introduces usability challenges, additional costs, and
Style APA, Harvard, Vancouver, ISO itp.
37

Čižiūnienė, Kristina, Margarita Prokopovič, Jurijus Zaranka, and Jonas Matijošius. "Biometric Breakthroughs for Sustainable Travel: Transforming Public Transportation through Secure Identification." Sustainability 16, no. 12 (2024): 5071. http://dx.doi.org/10.3390/su16125071.

Pełny tekst źródła
Streszczenie:
This study investigates the use of biometric technology in public transit to improve trip safety and effectiveness. The incorporation of biometric technology into transit networks improves efficiency and security but also poses substantial challenges of privacy, standardisation, and public acceptability. Conducted via a poll of 25 specialists in Lithuania, the objective was to assess the level of acceptability and practicality of using biometric identification for both drivers and passengers. The results suggest a divided view about the specific demographic that biometric applications should t
Style APA, Harvard, Vancouver, ISO itp.
38

Bolatbekkyzy, G. "Legal Issues of Cross-Border Data Transfer in the Era of Digital Government." Journal of Digital Technologies and Law 2, no. 2 (2024): 286–307. http://dx.doi.org/10.21202/jdtl.2024.15.

Pełny tekst źródła
Streszczenie:
Objective: to identify the main legal factors of cross-border data exchange in the context of digital technology proliferation and government digitalization, including legal guarantees, security issues, cybersecurity risks, approaches to regulating and improving the efficiency of data management in various jurisdictions.Methods: the study relies on synthesis and critical analysis of various aspects of the stated problem, including analysis of primary and secondary sources. By the example of the regulatory policies of China, the US, the EU and EAEU member states, different approaches regarding
Style APA, Harvard, Vancouver, ISO itp.
39

Khatiwada, Pankaj, Bian Yang, Jia-Chun Lin, and Bernd Blobel. "Patient-Generated Health Data (PGHD): Understanding, Requirements, Challenges, and Existing Techniques for Data Security and Privacy." Journal of Personalized Medicine 14, no. 3 (2024): 282. http://dx.doi.org/10.3390/jpm14030282.

Pełny tekst źródła
Streszczenie:
The evolution of Patient-Generated Health Data (PGHD) represents a major shift in healthcare, fueled by technological progress. The advent of PGHD, with technologies such as wearable devices and home monitoring systems, extends data collection beyond clinical environments, enabling continuous monitoring and patient engagement in their health management. Despite the growing prevalence of PGHD, there is a lack of clear understanding among stakeholders about its meaning, along with concerns about data security, privacy, and accuracy. This article aims to thoroughly review and clarify PGHD by exam
Style APA, Harvard, Vancouver, ISO itp.
40

Lee, Yeon-Ji, Na-Yeon Shin, and Il-Gu Lee. "Privacy-Preserving Data Sharing via PCA-Based Dimensionality Reduction in Non-IID Environments." Electronics 14, no. 13 (2025): 2711. https://doi.org/10.3390/electronics14132711.

Pełny tekst źródła
Streszczenie:
The proliferation of mobile devices has generated exponential data growth, driving efforts to extract value. However, mobile data often presents non-independent and identically distributed (non-IID) challenges owing to varying device, environmental, and user factors. While data sharing can mitigate non-IID issues, direct raw data transmission poses significant security risks like privacy breaches and man-in-the-middle attacks. This paper proposes a secure data-sharing mechanism using principal component analysis (PCA). Each node independently builds a local PCA model to reduce data dimensional
Style APA, Harvard, Vancouver, ISO itp.
41

Chen, Haoyu. "Person Re-ID: Tackling occlusion, labeled data, and privacy." Applied and Computational Engineering 86, no. 1 (2024): 161–73. http://dx.doi.org/10.54254/2755-2721/86/20241592.

Pełny tekst źródła
Streszczenie:
Person re-identification (ReID) has become a critical component in various security and surveillance systems, necessitating accurate and robust identification of individuals across different camera views. The motivation for enhancing ReID systems stems from the need to improve public safety, prevent crime, and support forensic investigations. Despite significant advances, ReID faces several key challenges that hinder its deployment in real-world applications. This review paper addresses key challenges in person re-identification (ReID): overcoming occlusion, reducing dependence on labeled data
Style APA, Harvard, Vancouver, ISO itp.
42

Qamar, Faizan, Syed Hussain Ali Kazmi, Maraj Uddin Ahmed Siddiqui, Rosilah Hassan, and Khairul Akram Zainol Ariffin. "Federated learning for millimeter-wave spectrum in 6G networks: applications, challenges, way forward and open research issues." PeerJ Computer Science 10 (October 9, 2024): e2360. http://dx.doi.org/10.7717/peerj-cs.2360.

Pełny tekst źródła
Streszczenie:
The emergence of 6G networks promises ultra-high data rates and unprecedented connectivity. However, the effective utilization of the millimeter-wave (mmWave) as a critical enabler of foreseen potential in 6G, poses significant challenges due to its unique propagation characteristics and security concerns. Deep learning (DL)/machine learning (ML) based approaches emerged as potential solutions; however, DL/ML contains centralization and data privacy issues. Therefore, federated learning (FL), an innovative decentralized DL/ML paradigm, offers a promising avenue to tackle these challenges by en
Style APA, Harvard, Vancouver, ISO itp.
43

B k, Jyoti, R. Nirmala, and G. Gurumita. "Enhancing Blockchain Framework Using Web3.0 for IoT Based Plant Disease Detection System." Journal of Smart Internet of Things 2024, no. 2 (2024): 166–78. https://doi.org/10.2478/jsiot-2024-0019.

Pełny tekst źródła
Streszczenie:
Abstract Plant diseases are considered as the major bottleneck for the farmers to monitor and diagnosis with the super intelligent methods. With the onset of Artificial Intelligence, Internet of Things(IoT), predicting the plant diseases in early stages has given the bright light of hope to farmers for boosting the productivity of agriculture in which increases the country’s economy. But the current advances in the IoT-AI-driven data gathers data from the agricultural fields and integrates the strong communication system for the early prediction and diagnosis process. Though these intelligent
Style APA, Harvard, Vancouver, ISO itp.
44

Liguori, Carlos. "Exploring Lawful Hacking as a Possible Answer to the "Going Dark" Debate." Michigan Technology Law Review, no. 26.2 (2020): 317. http://dx.doi.org/10.36645/mtlr.26.2.exploring.

Pełny tekst źródła
Streszczenie:
The debate on government access to encrypted data, popularly known as the “going dark” debate, has intensified over the years. On the one hand, law enforcement authorities have been pushing for mandatory exceptional access mechanisms on encryption systems in order to enable criminal investigations of both data in transit and at rest. On the other hand, both technical and industry experts argue that this solution compromises the security of encrypted systems and, thus, the privacy of their users. Some claim that other means of investigation could provide the information authorities seek without
Style APA, Harvard, Vancouver, ISO itp.
45

Jenab, Kouroush, Sam Khoury, and Kim LaFevor. "Flow-Graph and Markovian Methods for Cyber Security Analysis." International Journal of Enterprise Information Systems 12, no. 1 (2016): 59–84. http://dx.doi.org/10.4018/ijeis.2016010104.

Pełny tekst źródła
Streszczenie:
A flow-graph depicts the interrelationships among cyber security and security threats/incidents (i.e., internal, external, and accidental). Using a flow-graph, the manner in which security threats may affect systems can be investigated. This paper reports analytical approaches to analyze time to security threats and probability of security threat occurrence. Considering embedded threat detection functions in a safe-guard unit, the proposed approaches use the flow-graph concept, and Markovian method to calculate time to security threat occurrence and its probability. The threat detection functi
Style APA, Harvard, Vancouver, ISO itp.
46

Upadhyay, Shrikant, Mohit Kumar, Ashwani Kumar, et al. "Feature Extraction Approach for Speaker Verification to Support Healthcare System Using Blockchain Security for Data Privacy." Computational and Mathematical Methods in Medicine 2022 (July 25, 2022): 1–12. http://dx.doi.org/10.1155/2022/8717263.

Pełny tekst źródła
Streszczenie:
Speech is one form of biometric that combines both physiological and behavioral features. It is beneficial for remote-access transactions over telecommunication networks. Presently, this task is the most challenging one for researchers. People’s mental status in the form of emotions is quite complex, and its complexity depends upon internal behavior. Emotion and facial behavior are essential characteristics through which human internal thought can be predicted. Speech is one of the mechanisms through which human’s various internal reflections can be expected and extracted by focusing on the vo
Style APA, Harvard, Vancouver, ISO itp.
47

Seyedmostafa, Safavi, and Shukur Zarina. "CenterYou: Android privacy made easier the Cloud Way." Trends in Computer Science and Information Technology 7, no. 3 (2022): 057–73. http://dx.doi.org/10.17352/tcsit.000052.

Pełny tekst źródła
Streszczenie:
The Smartphone industry has expanded significantly over the last few years. According to the available data, each year, a marked increase in the number of devices in use is observed. Most consumers opt for Smartphones due to the extensive number of software applications that can be downloaded on their devices, thus increasing their functionality. However, this growing trend of application installation brings an issue of user protection, as most applications seek permissions to access data on a user’s device. The risks this poses to sensitive data are real to both corporate and individual users
Style APA, Harvard, Vancouver, ISO itp.
48

Arellano, April Moreno, Wenrui Dai, Shuang Wang, Xiaoqian Jiang, and Lucila Ohno-Machado. "Privacy Policy and Technology in Biomedical Data Science." Annual Review of Biomedical Data Science 1, no. 1 (2018): 115–29. http://dx.doi.org/10.1146/annurev-biodatasci-080917-013416.

Pełny tekst źródła
Streszczenie:
Privacy is an important consideration when sharing clinical data, which often contain sensitive information. Adequate protection to safeguard patient privacy and to increase public trust in biomedical research is paramount. This review covers topics in policy and technology in the context of clinical data sharing. We review policy articles related to ( a) the Common Rule, HIPAA privacy and security rules, and governance; ( b) patients’ viewpoints and consent practices; and ( c) research ethics. We identify key features of the revised Common Rule and the most notable changes since its previous
Style APA, Harvard, Vancouver, ISO itp.
49

Davydov, S. A. "The Concept of Security in Turkish History and Culture." Concept: philosophy, religion, culture 7, no. 2 (2023): 63–72. http://dx.doi.org/10.24833/2541-8831-2023-2-26-63-72.

Pełny tekst źródła
Streszczenie:
An analysis of the evolution of academic approaches to security issues in Turkish politics will help shed light on the development of Turkish political thought and the main theories and ideas that served as a catalyst for this process. This study is especially relevant in the modern context when the Turkish political establishment is regarded as more private and the underlying foreign policy documents are primarily classified. In addition, this study is able to give a new evaluation of a number of problems related to changes in the foreign policy of the Republic of Türkiye and provide a more r
Style APA, Harvard, Vancouver, ISO itp.
50

Vedant Sinha, Nikhil, and Sambhav Marupudi. "<b>AI-Enhanced Threat Detection and Response in Financial Cybersecurity: Current Practice and Emerging Trends</b>." International Journal of Engineering and Computer Science 14, no. 05 (2025): 27207–28. https://doi.org/10.18535/ijecs.v14i05.5133.

Pełny tekst źródła
Streszczenie:
Growing sophistication of cyberattacks calls for defense mechanisms beyond conventional approaches. Signature-based security mechanisms are ineffective against new threats such as zero-day exploits and advanced persistent threats. Artificial Intelligence (AI), through machine learning, provides the ability to sift through vast datasets, identify subtle patterns that are suggestive of an attack, and forecast vulnerabilities before exploitation, going beyond reactive defenses. Initial AI deployments, however, were plagued by adaptability and false positive problems. Despite its potential, integr
Style APA, Harvard, Vancouver, ISO itp.
Oferujemy zniżki na wszystkie plany premium dla autorów, których prace zostały uwzględnione w tematycznych zestawieniach literatury. Skontaktuj się z nami, aby uzyskać unikalny kod promocyjny!