• Title/Summary/Keyword: Data access

Search Result 5,405, Processing Time 0.029 seconds

Smart-Coord: Enhancing Healthcare IoT-based Security by Blockchain Coordinate Systems

  • Talal Saad Albalawi
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.8
    • /
    • pp.32-42
    • /
    • 2024
  • The Internet of Things (IoT) is set to transform patient care by enhancing data collection, analysis, and management through medical sensors and wearable devices. However, the convergence of IoT device vulnerabilities and the sensitivity of healthcare data raises significant data integrity and privacy concerns. In response, this research introduces the Smart-Coord system, a practical and affordable solution for securing healthcare IoT. Smart-Coord leverages blockchain technology and coordinate-based access management to fortify healthcare IoT. It employs IPFS for immutable data storage and intelligent Solidity Ethereum contracts for data integrity and confidentiality, creating a hierarchical, AES-CBC-secured data transmission protocol from IoT devices to blockchain repositories. Our technique uses a unique coordinate system to embed confidentiality and integrity regulations into a single access control model, dictating data access and transfer based on subject-object pairings in a coordinate plane. This dual enforcement technique governs and secures the flow of healthcare IoT information. With its implementation on the Matic network, the Smart-Coord system's computational efficiency and cost-effectiveness are unparalleled. Smart-Coord boasts significantly lower transaction costs and data operation processing times than other blockchain networks, making it a practical and affordable solution. Smart-Coord holds the promise of enhancing IoT-based healthcare system security by managing sensitive health data in a scalable, efficient, and secure manner. The Smart-Coord framework heralds a new era in healthcare IoT adoption, expertly managing data integrity, confidentiality, and accessibility to ensure a secure, reliable digital environment for patient data management.

Access Control of Digital Content Package by Using XML Encryption (XML 암호화를 이용한 디지털 콘텐츠 패키지의 접근 제어)

  • Cho, Kwang-Moon
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2004.11a
    • /
    • pp.291-295
    • /
    • 2004
  • As a large quantity of information is presented in XML format on the web, there are increasing demands for XML security. Until now research on XML security has been focused on the security of data network using digital signature and encryption technology. As XML data become extensive and complex however XML security comes to involve not only network security but also managerial security. But XML encryption support simple network security. So it cannot support multiple users and multiple access control policy. In this paper, we propose an integration method of encryption and access control policy for securing XML documents. This methodology can support multiple authorization of multiple users with integrating access control. And this can reduce the cost of the existing complicated access evaluation process of access control by using pre-processing.

  • PDF

Does Access to Finance Eradicate Poverty? A Case Study of Mudra Beneficiaries

  • SALGOTRA, Ajay Kumar;KANDARI, Prashant;BAHUGUNA, Uma
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.8 no.1
    • /
    • pp.637-646
    • /
    • 2021
  • The main objective of this study was to investigate the impact of access to finance on the different dimensions of poverty. To achieve the objectives of the study, the participants/beneficiaries of the Mudra scheme were included and sample of target respondents was extracted through multistage random sampling technique. The sample for the study was taken from the Union Territory of Jammu and Kashmir of India. The study further utilized secondary data from the government official websites and lead banks. A paired t-test was applied to test the impact of access to finance across the various dimensions of poverty by constructing the Multidimensional Poverty Index(MPI), after checking the normality of the data. MPI incorporates dimensions such as education, health, and standard of living.The finding of the study revealed that dimensions of poverty responded positively to access to finance. The study shows that larger access to finance has helped in reducing the multidimensional poverty by having moderate, but positive impact on the standard of living, health, and education, thereby improving the lives of the poor. The present study identified that the level of impact of access to finance is moderate and further explains its importance for policy implications.

Mobile Cloud System based on EMRA for Inbody Data

  • Lee, Jong-Sub;Moon, Seok-Jae
    • International Journal of Advanced Culture Technology
    • /
    • v.9 no.3
    • /
    • pp.327-333
    • /
    • 2021
  • Inbody is a tool for measuring health information with high reliability and accuracy to analyze body composition. Unlike the existing method of storing/processing and outputting data on the server side, the health information generated by InBody requires accurate support for health sharing and data analysis services using mobile devices. However, in the process of transmitting body composition measurement information to a mobile service, a problem may occur in data transmission/reception processing. The reason for this is that, since the network network in the cloud environment is used, if the connection is cut off or the connection is changed, it is necessary to provide a global service, not a temporary area, focusing on the mobility of InBody information. In addition, since InBody information is transmitted to mobile devices, a standard schema should be defined in the mobile cloud environment to enable information transfer between standardized InBody data and mobile devices. We propose a mobile cloud system using EMRA(Extended Metadata Registry Access) in which a mobile device processes and transmits body data generated in the inbody and manages the data of each local organization with a standard schema. The proposed system processes the data generated in InBody and converts it into a standard schema using EMRA so that standardized data can be transmitted. In addition, even when the mobile device moves through the area, the coordinator subsystem is in charge of providing access services. In addition, EMRA is applied to the collision problem due to schema heterogeneity occurring in the process of accessing data generated in InBody.

Fuzzy Keyword Search Method over Ciphertexts supporting Access Control

  • Mei, Zhuolin;Wu, Bin;Tian, Shengli;Ruan, Yonghui;Cui, Zongmin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.11
    • /
    • pp.5671-5693
    • /
    • 2017
  • With the rapid development of cloud computing, more and more data owners are motivated to outsource their data to cloud for various benefits. Due to serious privacy concerns, sensitive data should be encrypted before being outsourced to the cloud. However, this results that effective data utilization becomes a very challenging task, such as keyword search over ciphertexts. Although many searchable encryption methods have been proposed, they only support exact keyword search. Thus, misspelled keywords in the query will result in wrong or no matching. Very recently, a few methods extends the search capability to fuzzy keyword search. Some of them may result in inaccurate search results. The other methods need very large indexes which inevitably lead to low search efficiency. Additionally, the above fuzzy keyword search methods do not support access control. In our paper, we propose a searchable encryption method which achieves fuzzy search and access control through algorithm design and Ciphertext-Policy Attribute-based Encryption (CP-ABE). In our method, the index is small and the search results are accurate. We present word pattern which can be used to balance the search efficiency and privacy. Finally, we conduct extensive experiments and analyze the security of the proposed method.

Performance Assessment of an Access Point for Human Data and Machine Data

  • Lee, Hoon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.6
    • /
    • pp.1081-1090
    • /
    • 2015
  • This work proposes a theoretic framework for the performance assessment of an access point in the IP network that accommodates MD (Machine Data) and HD (Human Data). First, we investigate typical resource allocation methods in LTE for MD and HD. After that we carry out a Max-Min analysis about the surplus and deficiency of network resource seen from MD and HD. Finally, we evaluate the performance via numerical experiment.

Object-Based Operating System (OBJECT에 의한 운영체제의 구성에 대한 연구)

  • 이창수
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.8 no.1
    • /
    • pp.23-29
    • /
    • 1983
  • This paper describes object-based operating system to suppeor relability and abstract data type. For reliability, all objects should be accessed through access rights in capability, and the protection domain is provided for all program modules such that efficient domain switching can be achieved. For abstract data type, type manager is provided.

  • PDF

A Study on Data Hub for enhancing data access efficiency (Data Access 효율 증대를 위한 Data Hub 에 관한 연구)

  • Park, Eun-Young;Kim, Ung-Mo
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2007.11a
    • /
    • pp.274-277
    • /
    • 2007
  • 기업의 원활한 활동에 필수적인 요소는 살아 있는 정보의 공급이며, 기업 데이터 베이스는 데이터의 보관/흐름/활용 입장에서의 정보 인프라를 기반으로 하고 있다. 최근 기업 Knowledge Base 구축은 정보의 품질이 좌우하나 기업 정보의 양은 비대해져 데이터의 일관성이 결여되고 DB 의 성능은 점점 저하되고 있다. 본 고에서는 데이터 Hub 의 적용을 통해 얻을 수 있는 DB 성능 향상에 대해 정성적/정량적 관점으로 논의한다.

A Study of Efficient Access Method based upon the Spatial Locality of Multi-Dimensional Data

  • Yoon, Seong-young;Joo, In-hak;Choy, Yoon-chul
    • Proceedings of the Korea Database Society Conference
    • /
    • 1997.10a
    • /
    • pp.472-482
    • /
    • 1997
  • Multi-dimensional data play a crucial role in various fields, as like computer graphics, geographical information system, and multimedia applications. Indexing method fur multi-dimensional data Is a very Important factor in overall system performance. What is proposed in this paper is a new dynamic access method for spatial objects called HL-CIF(Hierarchically Layered Caltech Intermediate Form) tree which requires small amount of storage space and facilitates efficient query processing. HL-CIF tree is a combination of hierarchical management of spatial objects and CIF tree in which spatial objects and sub-regions are associated with representative points. HL-CIF tree adopts "centroid" of spatial objects as the representative point. By reflecting objects′sizes and positions in its structure, HL-CIF tree guarantees the high spatial locality of objects grouped in a sub-region rendering query processing more efficient.

  • PDF

Technology of MRAM (Magneto-resistive Random Access Memory) Using MTJ(Magnetic Tunnel Junction) Cell

  • Park, Wanjun;Song, I-Hun;Park, Sangjin;Kim, Teawan
    • JSTS:Journal of Semiconductor Technology and Science
    • /
    • v.2 no.3
    • /
    • pp.197-204
    • /
    • 2002
  • DRAM, SRAM, and FLASH memory are three major memory devices currently used in most electronic applications. But, they have very distinct attributes, therefore, each memory could be used only for limited applications. MRAM (Magneto-resistive Random Access Memory) is a promising candidate for a universal memory that meets all application needs with non-volatile, fast operational speed, and low power consumption. The simplest architecture of MRAM cell is a series of MTJ (Magnetic Tunnel Junction) as a data storage part and MOS transistor as a data selection part. To be a commercially competitive memory device, scalability is an important factor as well. This paper is testing the actual electrical parameters and the scaling factors to limit MRAM technology in the semiconductor based memory device by an actual integration of MRAM core cell. Electrical tuning of MOS/MTJ, and control of resistance are important factors for data sensing, and control of magnetic switching for data writing.