期刊文献+
共找到6篇文章
< 1 >
每页显示 20 50 100
Secure Sharing Scheme of Sensitive Data in the Precision Medicine System
1
作者 Deukhun Kim Heejin Kim Jin Kwak 《Computers, Materials & Continua》 SCIE EI 2020年第9期1527-1553,共27页
Numerous industries,especially the medical industry,are likely to exhibit significant developments in the future.Ever since the announcement of the precision medicine initiative by the United States in 2015,interest i... Numerous industries,especially the medical industry,are likely to exhibit significant developments in the future.Ever since the announcement of the precision medicine initiative by the United States in 2015,interest in the field has considerably increased.The techniques of precision medicine are employed to provide optimal treatment and medical services to patients,in addition to the prevention and management of diseases via the collection and analysis of big data related to their individual genetic characteristics,occupation,living environment,and dietary habits.As this involves the accumulation and utilization of sensitive information,such as patient history,DNA,and personal details,its implementation is difficult if the data are inaccurate,exposed,or forged,and there is also a concern for privacy,as massive amount of data are collected;hence,ensuring the security of information is essential.Therefore,it is necessary to develop methods of securely sharing sensitive data for the establishment of a precision medicine system.An authentication and data sharing scheme is presented in this study on the basis of an analysis of sensitive data.The proposed scheme securely shares sensitive data of each entity in the precision medicine system according to its architecture and data flow. 展开更多
关键词 Precision medicine sensitive data keyless signature infrastructure data sharing
下载PDF
Sensitive Information Security Based on Elliptic Curves
2
作者 Nadine Nibigira Vincent Havyarimana Zhu Xiao 《World Journal of Engineering and Technology》 2024年第2期274-285,共12页
The elliptic curve cryptography algorithm represents a major advancement in the field of computer security. This innovative algorithm uses elliptic curves to encrypt and secure data, providing an exceptional level of ... The elliptic curve cryptography algorithm represents a major advancement in the field of computer security. This innovative algorithm uses elliptic curves to encrypt and secure data, providing an exceptional level of security while optimizing the efficiency of computer resources. This study focuses on how elliptic curves cryptography helps to protect sensitive data. Text is encrypted using the elliptic curve technique because it provides great security with a smaller key on devices with limited resources, such as mobile phones. The elliptic curves cryptography of this study is better than using a 256-bit RSA key. To achieve equivalent protection by using the elliptic curves cryptography, several Python libraries such as cryptography, pycryptodome, pyQt5, secp256k1, etc. were used. These technologies are used to develop a software based on elliptic curves. If built, the software helps to encrypt and decrypt data such as a text messages and it offers the authentication for the communication. 展开更多
关键词 CRYPTOGRAPHY Elliptic Curves Digital Security data sensitive data IMPLEMENTATION
下载PDF
Secure Sensitive Data Sharing on a Big Data Platform 被引量:12
3
作者 Xinhua Dong Ruixuan Li +3 位作者 Heng He Wanwan Zhou Zhengyuan Xue Hao Wu 《Tsinghua Science and Technology》 SCIE EI CAS CSCD 2015年第1期72-80,共9页
Users store vast amounts of sensitive data on a big data platform. Sharing sensitive data will help enterprises reduce the cost of providing users with personalized services and provide value-added data services.Howev... Users store vast amounts of sensitive data on a big data platform. Sharing sensitive data will help enterprises reduce the cost of providing users with personalized services and provide value-added data services.However, secure data sharing is problematic. This paper proposes a framework for secure sensitive data sharing on a big data platform, including secure data delivery, storage, usage, and destruction on a semi-trusted big data sharing platform. We present a proxy re-encryption algorithm based on heterogeneous ciphertext transformation and a user process protection method based on a virtual machine monitor, which provides support for the realization of system functions. The framework protects the security of users' sensitive data effectively and shares these data safely. At the same time, data owners retain complete control of their own data in a sound environment for modern Internet information security. 展开更多
关键词 secure sharing sensitive data big data proxy re-encryption private space
原文传递
Pilot Study on the Intercalibration of a Categorisation System for FAlRer Digital Objects Related to Sensitive Data in the Life Sciences
4
作者 Christian Ohmann Romain David +11 位作者 Monica Cano Abadia Florence Bietrix Jan-Willem Boiten Steve Canham Maria Luisa Chiusano Walter Dastru Arnaud Laroquette Dario Longo Michaela Theresia Mayrhofer Maria Panagiotopoulou Audrey Richard Pablo Emilio Verde 《Data Intelligence》 EI 2022年第2期196-211,共16页
Sharing sensitive data is a specific challenge for research infrastructures in the field of life sciences.For that reason a toolbox has been developed,providing resources for researchers who wish to share and use sens... Sharing sensitive data is a specific challenge for research infrastructures in the field of life sciences.For that reason a toolbox has been developed,providing resources for researchers who wish to share and use sensitive data,to support the workflows for handling these kinds of digital objects.Common and community approved annotations are required to be compliant with FAIR principles(Findability,Accessibility,Interoperability,Reusability).The toolbox makes use of a tagging(categorisation)system,allowing consistent labelling and categorisation of digital objects,in terms relevant to data sharing tasks and activities.A pilot study was performed within the Horizon 2020 project EOSC-Life,in which 2 experts from 6 life sciences research infrastructures were recruited to independently assign tags to the same set of 10 to 25 resources related to sensitive data management and data sharing(in total 110).Summary statistics of agreement and observer variation per research infrastructure are provided.The pilot study has shown that experts were able to attribute tags but in most cases with a considerable observer variation between experts.In the context of CWFR(Canonical Workflow Frameworks for Research),this indicates the necessity for careful definition,evaluation and validation of parameters and processes related to workflow descriptions.The results from this pilot study were used to tackle this issue by revising the categorisation system and providing an updated version. 展开更多
关键词 sensitive data CWFR EOSC-Life Life sciences TOOLBOX Categorisation system Tagging FAIR
原文传递
VRS-DB:preserve confidentiality of users'data using encryption approach
5
作者 J.S.Rauthan K.S.Vaisla 《Digital Communications and Networks》 SCIE CSCD 2021年第1期62-71,共10页
We focus on security and privacy problems within a cloud database framework,exploiting the DataBase as a Service(DBaaS).In this framework,an information proprietor drives out its information to a cloud database profes... We focus on security and privacy problems within a cloud database framework,exploiting the DataBase as a Service(DBaaS).In this framework,an information proprietor drives out its information to a cloud database professional company.The Data-Owner(DO)encrypts the delicate information before transmission at the cloud database professional company end to offer information security.Current encryption ideas,nonetheless,are just halfway homomorphic as all of them intend to enable an explicit kind of calculation,which is accomplished on scrambled information.These current plans can't be coordinated to solve genuine functional queries that include activities of various types.We propose and evaluate a Verifiable Reliable Secure-DataBase(VRS-DB)framework on shared tables along with many primary operations on scrambled information,which enables information interoperability,and permits an extensive possibility of Structured Query Language(SQL)queries to be prepared by the service provider on the encoded data.We show that our security and privacy idea is protected from two forms of threats and are fundamentally proficient. 展开更多
关键词 PRIVACY Security Cloud storage Encrypted query CRYPTOGRAPHY sensitive data
下载PDF
6T SRAM cell analysis for DRV and read stability
6
作者 Ruchi S.Dasgupta 《Journal of Semiconductors》 EI CAS CSCD 2017年第2期73-79,共7页
The present paper analyzes the hold and read stability with temperature and aspect ratio variations. To reduce the power dissipation, one of the effective techniques is the supply voltage reduction. At this reduced su... The present paper analyzes the hold and read stability with temperature and aspect ratio variations. To reduce the power dissipation, one of the effective techniques is the supply voltage reduction. At this reduced supply voltage the data must be stable. So, the minimum voltage should be discovered which can also retain the data. This voltage is the data retention voltage(DRV). The DRV for 6T SRAM cell is estimated and analyzed in this paper.The sensitivity analysis is performed for the DRV variation with the variation in the temperature and aspect ratio of the pull up and pull down transistors. Cadence Virtuoso is used for DRV analysis using 45 nm GPDK technology files. After this, the read stability analysis of 6T SRAM cell in terms of SRRV(supply read retention voltage) and WRRV(wordline read retention voltage) is carried out. Read stability in terms of RSNM can be discovered by accessing the internal storage nodes. But in the case of dense SRAM arrays instead of using internal storage nodes,the stability can be discovered by using direct bit line measurements with the help of SRRV and WRRV. SRRV is used to find the minimum supply voltage for which data can be retained during a read operation. Similarly, WRRV is used to find the boosted value of wordline voltage, for which data can be retained during read operation. The SRRV and WRRV values are then analyzed for different Cell Ratios. The results of SRRV and WRRV are then compared with the reported data for the validation of the accuracy of the results. 展开更多
关键词 DRV SRRV WRRV data retention leakage reduction low power SRAM sensitivity analysis
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部