Balancing Security and Performance for Enhancing Data Privacy in Data Warehouses

Author(s):  
Ricardo Jorge Santos ◽  
Jorge Bernardino ◽  
Marco Vieira
Electronics ◽  
2021 ◽  
Vol 10 (5) ◽  
pp. 560
Author(s):  
Andrea Bonci ◽  
Simone Fiori ◽  
Hiroshi Higashi ◽  
Toshihisa Tanaka ◽  
Federica Verdini

The prospect and potentiality of interfacing minds with machines has long captured human imagination. Recent advances in biomedical engineering, computer science, and neuroscience are making brain–computer interfaces a reality, paving the way to restoring and potentially augmenting human physical and mental capabilities. Applications of brain–computer interfaces are being explored in applications as diverse as security, lie detection, alertness monitoring, gaming, education, art, and human cognition augmentation. The present tutorial aims to survey the principal features and challenges of brain–computer interfaces (such as reliable acquisition of brain signals, filtering and processing of the acquired brainwaves, ethical and legal issues related to brain–computer interface (BCI), data privacy, and performance assessment) with special emphasis to biomedical engineering and automation engineering applications. The content of this paper is aimed at students, researchers, and practitioners to glimpse the multifaceted world of brain–computer interfacing.


2016 ◽  
Vol 13 (1) ◽  
pp. 204-211
Author(s):  
Baghdad Science Journal

The internet is a basic source of information for many specialities and uses. Such information includes sensitive data whose retrieval has been one of the basic functions of the internet. In order to protect the information from falling into the hands of an intruder, a VPN has been established. Through VPN, data privacy and security can be provided. Two main technologies of VPN are to be discussed; IPSec and Open VPN. The complexity of IPSec makes the OpenVPN the best due to the latter’s portability and flexibility to use in many operating systems. In the LAN, VPN can be implemented through Open VPN to establish a double privacy layer(privacy inside privacy). The specific subnet will be used in this paper. The key and certificate will be generated by the server. An authentication and key exchange will be based on standard protocol SSL/TLS. Various operating systems from open source and windows will be used. Each operating system uses a different hardware specification. Tools such as tcpdump and jperf will be used to verify and measure the connectivity and performance. OpenVPN in the LAN is based on the type of operating system, portability and straightforward implementation. The bandwidth which is captured in this experiment is influenced by the operating system rather than the memory and capacity of the hard disk. Relationship and interoperability between each peer and server will be discussed. At the same time privacy for the user in the LAN can be introduced with a minimum specification.


2011 ◽  
pp. 133-145 ◽  
Author(s):  
James G. Anderson

Information technology such as electronic medical records (EMRs), electronic prescribing, and clinical decision support systems are recognized as essential tools in all developed countries. However, the U.S. lags significantly behind other countries that are members of the Organization for Economic Cooperation and Development (OECD). Significant barriers impede wide-scale adoption of these tools in the U.S., especially EMR systems. These barriers include lack of access to capital by healthcare providers, complex systems, and lack of data standards that permit exchange of clinical data, privacy concerns and legal barriers, and provider resistance. Overcoming these barriers will require subsidies and performance incentives by payers and government, certification and standardization of vendor applications that permit clinical data exchange, removal of legal barriers, and convincing evidence of the cost-effectiveness of these IT applications.


2018 ◽  
Vol 2018 ◽  
pp. 1-12 ◽  
Author(s):  
Jinbo Xiong ◽  
Rong Ma ◽  
Lei Chen ◽  
Youliang Tian ◽  
Li Lin ◽  
...  

Mobile crowdsensing as a novel service schema of the Internet of Things (IoT) provides an innovative way to implement ubiquitous social sensing. How to establish an effective mechanism to improve the participation of sensing users and the authenticity of sensing data, protect the users’ data privacy, and prevent malicious users from providing false data are among the urgent problems in mobile crowdsensing services in IoT. These issues raise a gargantuan challenge hindering the further development of mobile crowdsensing. In order to tackle the above issues, in this paper, we propose a reliable hybrid incentive mechanism for enhancing crowdsensing participations by encouraging and stimulating sensing users with both reputation and service returns in mobile crowdsensing tasks. Moreover, we propose a privacy preserving data aggregation scheme, where the mediator and/or sensing users may not be fully trusted. In this scheme, differential privacy mechanism is utilized through allowing different sensing users to add noise data, then employing homomorphic encryption for protecting the sensing data, and finally uploading ciphertext to the mediator, who is able to obtain the collection of ciphertext of the sensing data without actual decryption. Even in the case of partial sensing data leakage, differential privacy mechanism can still ensure the security of the sensing user’s privacy. Finally, we introduce a novel secure multiparty auction mechanism based on the auction game theory and secure multiparty computation, which effectively solves the problem of prisoners’ dilemma incurred in the sensing data transaction between the service provider and mediator. Security analysis and performance evaluation demonstrate that the proposed scheme is secure and efficient.


2015 ◽  
Vol 34 (3) ◽  
pp. 425-461 ◽  
Author(s):  
Rodrigo Costa Mateus ◽  
Thiago Luís Lopes Siqueira ◽  
Valéria Cesário Times ◽  
Ricardo Rodrigues Ciferri ◽  
Cristina Dutra de Aguiar Ciferri

Retos ◽  
2015 ◽  
pp. 72-78
Author(s):  
Álvaro Bustamante ◽  
Pablo Burillo

Introducción: La gestión de los recursos y el análisis del rendimiento son determinantes en cualquier entidad deportiva. En el caso de deportes de equipo como el baloncesto, este tipo de herramientas son básicas para ayudar en la toma de decisiones. Objetivos: Realizar una revisión bibliográfica sobre las tendencias actuales en el desarrollo de sistemas informáticos de gestión deportiva y análisis del rendimiento. Y revisar las herramientas informáticas que en la actualidad prestan este tipo de servicios. Método: Se realizó una búsqueda bibliográfica exhaustiva en cinco bases de datos de referencia en investigación deportiva, obteniendo 717 resultados de los cuales se consideraron relevantes un total de 58. Además, se realizó una búsqueda electrónica de herramientas informáticas de referencia en el sector deportivo y se han analizado 22 de ellas, estudiando sus características, autores, presupuesto y limitaciones. Resultados: Existen características comunes en el desarrollo de herramientas de gestión y análisis del rendimiento deportivo: acceso web, calendario de planificación, registro de la evolución de los jugadores, repositorios de ejercicios y gestión económica, entre otras. Conclusiones: Tradicionalmente no se han integrado las herramientas de gestión y análisis del rendimiento en baloncesto, pero sí existe software que proporcione ambos servicios en fútbol. Los estudios futuros versarán sobre cuestiones de privacidad de datos y la mejora de los sistemas expertos.Abstract. Background: Human resources management and performance analysis are decisive for any sport institution. Moreover, sport managers being in charge of sport clubs must tackle specific issues related to the sport sector. For team sports like basketball, these kind of tools are very important to help at analysis and decision making. Objectives: To find current trends at sport management and performance analysis software. Besides, to review actual management and performance software tools. Method: An exhaustive scientific literature research has been made for five sport-specific research databases. 717 results were gathered and 58 of them were relevant to this study. Some further electronic research was made in order to find valuable software tools for this field. 22 of them were revised taking into account their features, authors, budget and limitations. Results: Common features have been identified for the development of management and performance analysis of sports. Some common features for this kind of software are: web access, planning calendar, player evolution following, exercise databases and economic management, among others. Conclusions: Traditionally, management and performance analysis have not been integrated in one tool for basketball, but some new software is being designed for supporting both in football (soccer). Future studies will tackle data privacy and the improvement of the use of expert systems.


Author(s):  
Sue Milton

This chapter assumes data is a key asset that, if lost or damaged, severely disrupts business capability and reputation. The chapter has one core purpose, to provide leaders with sufficient understanding of two data management fundamentals, data privacy and data security. Without that understanding, Information Technology (IT) security will always be seen as a cost on, not an investment towards, quality and performance. The chapter reviews the relationship between data privacy and data security. It argues that data security cannot be achieved until data privacy issues have been addressed. Simply put, data privacy is fundamental to any data usage policy and data security to the data access policy. The topic is then discussed in broader terms, in the context of data and information management, covering various themes such as cyber-crime, governance, and innovations in identity management. The chapter's intended outcome is to clarify the relationship between data privacy and security and how this understanding helps reduce data abuse. The link between privacy and security will also demystify the reason for high costs in implementing and maintaining security policies and explain why leaders need to provide stronger IT strategic leadership to ensure IT investment is defined and implemented wisely.


2018 ◽  
Vol 7 (S1) ◽  
pp. 87-89
Author(s):  
Avula Satya Sai Kumar ◽  
S. Mohan ◽  
R. Arunkumar

As emerging data world like Google and Wikipedia, volume of the data growing gradually for centralization and provide high availability. The storing and retrieval in large volume of data is specialized with the big data techniques. In addition to the data management, big data techniques should need more concentration on the security aspects and data privacy when the data deals with authorized and confidential. It is to provide secure encryption and access control in centralized data through Attribute Based Encryption (ABE) Algorithm. A set of most descriptive attributes is used as categorize to produce secret private key and performs access control. Several works proposed in existing based on the different access structures of ABE algorithms. Thus the algorithms and the proposed applications are literally surveyed and detailed explained and also discuss the functionalities and performance aspects comparison for desired ABE systems.


Author(s):  
James G. Anderson

Information technology such as electronic medical records (EMRs), electronic prescribing, and clinical decision support systems are recognized as essential tools in all developed countries. However, the U.S. lags significantly behind other countries that are members of the Organization for Economic Cooperation and Development (OECD). Significant barriers impede wide-scale adoption of these tools in the U.S., especially EMR systems. These barriers include lack of access to capital by healthcare providers, complex systems, and lack of data standards that permit exchange of clinical data, privacy concerns and legal barriers, and provider resistance. Overcoming these barriers will require subsidies and performance incentives by payers and government, certification and standardization of vendor applications that permit clinical data exchange, removal of legal barriers, and convincing evidence of the cost-effectiveness of these IT applications.


2015 ◽  
Vol 11 (2) ◽  
pp. 22-43 ◽  
Author(s):  
Varunya Attasena ◽  
Nouria Harbi ◽  
Jérôme Darmont

Cloud computing helps reduce costs, increase business agility and deploy solutions with a high return on investment for many types of applications, including data warehouses and on-line analytical processing. However, storing and transferring sensitive data into the cloud raises legitimate security concerns. In this paper, the authors' propose a new multi-secret sharing approach for deploying data warehouses in the cloud and allowing on-line analysis processing, while enforcing data privacy, integrity and availability. The authors' first validate the relevance of their approach theoretically and then experimentally with both a simple random dataset and the Star Schema Benchmark. The authors also demonstrate its superiority to related methods.


Sign in / Sign up

Export Citation Format

Share Document