scholarly journals My Private Cloud Overview: A Trust, Privacy and Security Infrastructure for the Cloud

Author(s):  
David W. Chadwick ◽  
Stijn F. Lievens ◽  
Jerry I. den Hartog ◽  
Andreas Pashalidis ◽  
Joseph Alhadeff
Author(s):  
J. Charles Victor ◽  
P. Alison Paprica ◽  
Michael Brudno ◽  
Carl Virtanen ◽  
Walter Wodchis ◽  
...  

IntroductionCanadian provincial health systems have a data advantage – longitudinal population-wide data for publicly funded health services, in many cases going back 20 years or more. With the addition of high performance computing (HPC), these data can serve as the foundation for leading-edge research using machine learning and artificial intelligence. Objectives and ApproachThe Institute for Clinical Evaluative Sciences (ICES) and HPC4Health are creating the Ontario Data Safe Haven (ODSH) – a secure HPC cloud located within the HPC4Health physical environment at the Hospital for Sick Children in Toronto. The ODSH will allow research teams to post, access and analyze individual datasets over which they have authority, and enable linkage to Ontario administrative and other data. To start, the ODSH is focused on creating a private cloud meeting ICES’ legislated privacy and security requirements to support HPC-intensive analyses of ICES data. The first ODSH projects are partnerships between ICES scientists and machine learning. ResultsAs of March 2018, the technological build of the ODSH was tested and completed and the privacy and security policy framework and documentation were completed. We will present the structure of the ODSH, including the architectural choices made when designing the environment, and planned functionality in the future. We will describe the experience to-date for the very first analysis done using the ODSH: the automatic mining of clinical terminology in primary care electronic medical records using deep neural networks. We will also present the plans for a high-cost user Risk Dashboard program of research, co-designed by ICES scientists and health faculty from the Vector Institute for artificial intelligence, that will make use of the ODSH beginning May 2018. Conclusion/ImplicationsThrough a partnership of ICES, HPC4Health and the Vector Institute, a secure private cloud ODSH has been created as is starting to be used in leading edge machine learning research studies that make use of Ontario’s population-wide data assets.


Author(s):  
Malu Roldan ◽  
Alan Rea

The rapid growth in online usage has resulted in greater concerns about the privacy and security of users. These concerns are no less pertinent in virtual worlds where users often undertake virtual identities that stretch the boundaries of their real-world identities. These in-world personas may be detrimental to users’ careers and reputations should their in-world activities be linked to their real-world identities in digital dossiers. This chapter reviews and classifies privacy transgressions in virtual worlds and provides an overview of technological, behavioral and policy solutions to address these transgressions. The authors conclude with a discussion of the future research and multi-sector collaboration required to integrate disparate, emerging solutions into a federated security infrastructure for the Internet and virtual worlds. The current state of privacy solutions presents an opportunity for virtual worlds to attract more mainstream users as part of the ecosystem of organizations providing security services to online users.


2014 ◽  
Vol 1 (1) ◽  
pp. 14-22
Author(s):  
Ghiri Basuki Putra

Cloud computing telah menjadi hal yang menarik untuk dibahas dikarenakan perkembangannya yang begitu pesat sejak pertama kali diperkenalkan mulai tahun 2000. Pemanfaatan cloud computing kepada penyimpanan data, pemakaian software secara bersama- sama serta penggunaan infrastruktur dan hardware pada jaringan atau komputer yang tergabung dalam sebuah cloud computing. Dengan cloud computing diharapkan adanya efesiensi dan kemudahan dalam  sumber daya baik software, data maupun hardware agar dapat digunakan bersama – sama. Perancangan cloud computing untuk laboratorium komputer Teknik Elektro Universitas Bangka Belitung bertujuan sebagai rancangan awal untuk pengembangan laboratorium komputer serta sebagai pusat pembelajaran dan penelitian cloud computing bagi mahasiswa Teknik Elektro. Perancangan cloud computing ini menggunakan metode Software as a Service (SaaS) dimana SaaS adalah layanan dari Cloud Computing dimana memakai software (perangkat lunak) yang telah disediakan sehingga tidak perlu setiap komputer di laboratorium menginstall software yang diperlukan selama tersedia di layanan Cloud Computing. Rancangan cloud computing di laboratorium menggunakan Private Cloud Computing merupakan pemodelan Cloud Computing yang memberikan lingkup yang lebih kecil untuk dapat memberikan layanan kepada pengguna tertentu misalnya pada sebuah jaringan komputer  lokal maupun pada skala perusahaan kecil maupun menengah.


2017 ◽  
Vol 10 (2) ◽  
Author(s):  
Irfan Santiko ◽  
Rahman Rosidi ◽  
Seta Agung Wibawa

Author(s):  
S. Karthiga Devi ◽  
B. Arputhamary

Today the volume of healthcare data generated increased rapidly because of the number of patients in each hospital increasing.  These data are most important for decision making and delivering the best care for patients. Healthcare providers are now faced with collecting, managing, storing and securing huge amounts of sensitive protected health information. As a result, an increasing number of healthcare organizations are turning to cloud based services. Cloud computing offers a viable, secure alternative to premise based healthcare solutions. The infrastructure of Cloud is characterized by a high volume storage and a high throughput. The privacy and security are the two most important concerns in cloud-based healthcare services. Healthcare organization should have electronic medical records in order to use the cloud infrastructure. This paper surveys the challenges of cloud in healthcare and benefits of cloud techniques in health care industries.


2018 ◽  
Vol 6 (3) ◽  
pp. 283-291
Author(s):  
Vishva Patel ◽  
◽  
Dhara Patel ◽  
Sunit Parmar ◽  
◽  
...  
Keyword(s):  

10.29007/jlq6 ◽  
2019 ◽  
Author(s):  
Thabang Mofokeng

The technology devices introduced in recent years are not only vulnerable to Internet risks but are also unable to elevate the growth of B2C e-commerce. These concerns are particularly relevant today, as the world transitions into the Fourth Industrial Revolution. To date, existing research has largely focused on obstacles to customer loyalty. Studies have tested e-commerce models guided by the establishment of trusting, satisfied and loyal consumers in various international contexts. In South Africa, however, as an emerging market, there has been limited research on the success factors of online shopping.This study examines the influence of security and privacy on trust, seen as a moderator of customer satisfaction, which in turn, has an effect on loyalty towards websites. Based on an exhaustive review of literature, a conceptual model is proposed on the relationships between security and privacy on the one hand, and customer trust, satisfaction and loyalty on the other. A total of 250 structured, self-administered questionnaires was distributed to a purposively selected sample of respondents using face-to-face surveys in Johannesburg, South Africa. A multivariate data analysis technique was used to draw inferences from the data. With an 80.1% response rate, the findings showed that privacy and security do influence customer trust; security strongly influences customer trust and weakly influences satisfaction. In South Africa, customer loyalty towards websites is strongly determined by satisfaction and weakly determined by trust. Trust significantly moderates the effect of customer satisfaction on loyalty. The study implications and limitations are presented and future research directions are suggested.


Sign in / Sign up

Export Citation Format

Share Document