Privacy protection for big data linking is discussed here in relation to the Central Statistics Office (CSO), Ireland's, big data linking project titled the 'Structure of Earnings Survey - Administrative Data Proj...Privacy protection for big data linking is discussed here in relation to the Central Statistics Office (CSO), Ireland's, big data linking project titled the 'Structure of Earnings Survey - Administrative Data Project' (SESADP). The result of the project was the creation of datasets and statistical outputs for the years 2011 to 2014 to meet Eurostat's annual earnings statistics requirements and the Structure of Earnings Survey (SES) Regulation. Record linking across the Census and various public sector datasets enabled the necessary information to be acquired to meet the Eurostat earnings requirements. However, the risk of statistical disclosure (i.e. identifying an individual on the dataset) is high unless privacy and confidentiality safe-guards are built into the data matching process. This paper looks at the three methods of linking records on big datasets employed on the SESADP, and how to anonymise the data to protect the identity of the individuals, where potentially disclosive variables exist.展开更多
Warning alerts are specially designed to protect user rights and safety to avoid serious damage caused by overlooking the essence of warning alerts. Today’s world of Information Communication Technology (ICT) needs i...Warning alerts are specially designed to protect user rights and safety to avoid serious damage caused by overlooking the essence of warning alerts. Today’s world of Information Communication Technology (ICT) needs improvement and to review the decisions of security experts in terms of improving warning designs and dialogues, and timely inform the authorities to take quick action at the right time and choice. Human behaviour is deeply involved in most of the security failures and its poor response. If we are able to check and monitor human behaviour in any organisation, we can achieve quality assurance and provide best services to our customers. We have arranged a study in the Center of Post Graduate Studies, International Islamic University, Malaysia (CPS-IIUM), department of Hajj Services-Makkah, and Hospital Management System-Makkah comprised of Observation, Interviews, Questionnaire and discussion based on organizational structure and job activities of people involved in different scenarios and positions under one umbrella of organizational objectives in order to trap the human error in order to take rapid action and response from the management team. Human behaviour is deeply observed and checked while performing different job activities in order to identify the serious errors at the right time during job performance at various levels. We have applied the concept of Brahm’s Language for the simulation of human behaviour which proves an opportunity to simulate human behaviour while performing job activities. Customer service can be improved easily if necessary measures and decisions are taken at the right time and place in any organisation.展开更多
In this paper, through an information-theoretic approach, we construct estimations and confidence intervals of Z-functionals involving finite population and with the presence of auxiliary information. In particular, w...In this paper, through an information-theoretic approach, we construct estimations and confidence intervals of Z-functionals involving finite population and with the presence of auxiliary information. In particular, we give a method of estimating the variance of finite population with known mean. The modified estimates and confidence intervals for Z-functionals can adequately use the auxiliary information, at least not worse than what the standard ones do. A simulation study is presented to assess the performance of the modified estimates for the finite sample case.展开更多
Unquestionably, communicating entities (object, or things) in the Internet of Things (IoT) context are playing an active role in human activities, systems and processes. The high connectivity of intelligent object...Unquestionably, communicating entities (object, or things) in the Internet of Things (IoT) context are playing an active role in human activities, systems and processes. The high connectivity of intelligent objects and their severe constraints lead to many security challenges, which are not included in the classical formulation of security problems and solutions. The Security Shield for IoT has been identified by DARPA (Defense Advanced Research Projects Agency) as one of the four projects with a potential impact broader than the Internet itself. To help interested researchers contribute to this research area, an overview of the loT security roadmap overview is presented in this paper based on a novel cognitive and systemic approach. The role of each component of the approach is explained, we also study its interactions with the other main components, and their impact on the overall. A case study is presented to highlight the components and interactions of the systemic and cognitive approach. Then, security questions about privacy, trust, identification, and access control are discussed. According to the novel taxonomy of the loT framework, different research challenges are highlighted, important solutions and research activities are revealed, and interesting research directions are proposed. In addition, current stan dardization activities are surveyed and discussed to the ensure the security of loT components and applications.展开更多
Many organizations have datasets which contain a high volume of personal data on individuals,e.g.,health data.Even without a name or address,persons can be identified based on the details(variables)on the dataset.This...Many organizations have datasets which contain a high volume of personal data on individuals,e.g.,health data.Even without a name or address,persons can be identified based on the details(variables)on the dataset.This is an important issue for big data holders such as public sector organizations(e.g.,Public Health Organizations)and social media companies.This paper looks at how individuals can be identified from big data using a mathematical approach and how to apply this mathematical solution to prevent accidental disclosure of a person’s details.The mathematical concept is known as the“Identity Correlation Approach”(ICA)and demonstrates how an individual can be identified without a name or address using a unique set of characteristics(variables).Secondly,having identified the individual person,it shows how a solution can be put in place to prevent accidental disclosure of the personal details.Thirdly,how to store data such that accidental leaks of the datasets do not lead to the disclosure of the personal details to unauthorized users.展开更多
The Internet of Things is a modern technology that is directed at easing human life by automating most of the things used in daily life.The never-ending dependency on the network for communication is attracting advers...The Internet of Things is a modern technology that is directed at easing human life by automating most of the things used in daily life.The never-ending dependency on the network for communication is attracting adversaries to exploit the vulnerabilities of IoT.Therefore,this technology is facing some serious issues and challenges concerning security and privacy.These issues and challenges are the real motivation behind considering this study.Hence,this survey includes a discussion about security and privacy challenges as well as available solutions for IoT based wireless sensor networks.This systematic literature review(SLR)focuses particularly on a popular and applicable security approach known as Trust Management System(TMS).Firstly,all aspects of trust management,including trust indicators,trust properties,trust evaluation,trust building,trust models and the importance of those models for security and privacy,trust prediction methodologies,and ultimately trust-based attacks,are covered in this literature.Secondly,trust management schemes are classified into four groups based on the methodology used for trust-based security solutions in the IoT:cryptography-based,computational and probabilistic-based,information theory-based,and others.Then,an understanding of the problems and difficulties with current methodologies is given,along with suggestions for further research.Finally,the SLR is concluded by formulating the desirable characteristics of a trust management system in the IoT and proposing a trust model suitable for IoT networks.展开更多
文摘Privacy protection for big data linking is discussed here in relation to the Central Statistics Office (CSO), Ireland's, big data linking project titled the 'Structure of Earnings Survey - Administrative Data Project' (SESADP). The result of the project was the creation of datasets and statistical outputs for the years 2011 to 2014 to meet Eurostat's annual earnings statistics requirements and the Structure of Earnings Survey (SES) Regulation. Record linking across the Census and various public sector datasets enabled the necessary information to be acquired to meet the Eurostat earnings requirements. However, the risk of statistical disclosure (i.e. identifying an individual on the dataset) is high unless privacy and confidentiality safe-guards are built into the data matching process. This paper looks at the three methods of linking records on big datasets employed on the SESADP, and how to anonymise the data to protect the identity of the individuals, where potentially disclosive variables exist.
文摘Warning alerts are specially designed to protect user rights and safety to avoid serious damage caused by overlooking the essence of warning alerts. Today’s world of Information Communication Technology (ICT) needs improvement and to review the decisions of security experts in terms of improving warning designs and dialogues, and timely inform the authorities to take quick action at the right time and choice. Human behaviour is deeply involved in most of the security failures and its poor response. If we are able to check and monitor human behaviour in any organisation, we can achieve quality assurance and provide best services to our customers. We have arranged a study in the Center of Post Graduate Studies, International Islamic University, Malaysia (CPS-IIUM), department of Hajj Services-Makkah, and Hospital Management System-Makkah comprised of Observation, Interviews, Questionnaire and discussion based on organizational structure and job activities of people involved in different scenarios and positions under one umbrella of organizational objectives in order to trap the human error in order to take rapid action and response from the management team. Human behaviour is deeply observed and checked while performing different job activities in order to identify the serious errors at the right time during job performance at various levels. We have applied the concept of Brahm’s Language for the simulation of human behaviour which proves an opportunity to simulate human behaviour while performing job activities. Customer service can be improved easily if necessary measures and decisions are taken at the right time and place in any organisation.
基金Supported by National Natural Science Foundation of China (Grant Nos.10571093 and 10871104)SRFDP of China (Grant No.20050055038)
文摘In this paper, through an information-theoretic approach, we construct estimations and confidence intervals of Z-functionals involving finite population and with the presence of auxiliary information. In particular, we give a method of estimating the variance of finite population with known mean. The modified estimates and confidence intervals for Z-functionals can adequately use the auxiliary information, at least not worse than what the standard ones do. A simulation study is presented to assess the performance of the modified estimates for the finite sample case.
文摘生物特征识别是一种有着特征唯一、不易复制等良好特性的个人身份鉴定与识别技术.但在识别过程中,个人信息通过公开信道传输或网络服务器存储时,有可能会受到第三方的截获和修改,或通信双方提供虚假信息进行相互欺骗.可通过引入全同态加密协议以保护数据与分类器.此类方案设计主要存在2方面问题:一方面是只支持"加乘"运算的全同态加密算法与识别算法的运算相容性问题;另一方面是由于加密算法的约束导致识别率与运行效率的降低.以C/S模型为基础,采用了Gabor小波和核主成分分析法,利用数据的非线性信息和高阶统计特性以提高识别率;并设计了通信协议,使用了多项式核和改进后的DGHV加密方案,以解决相容性问题.原型实现的实验数据表明,该方案在承接源自全同态加密的隐私保护的前提下,有着较高的识别率与运行效率,其累积匹配率为91.9%,最高识别率为97.62%,最大识别时间花销约为1 s.
文摘Unquestionably, communicating entities (object, or things) in the Internet of Things (IoT) context are playing an active role in human activities, systems and processes. The high connectivity of intelligent objects and their severe constraints lead to many security challenges, which are not included in the classical formulation of security problems and solutions. The Security Shield for IoT has been identified by DARPA (Defense Advanced Research Projects Agency) as one of the four projects with a potential impact broader than the Internet itself. To help interested researchers contribute to this research area, an overview of the loT security roadmap overview is presented in this paper based on a novel cognitive and systemic approach. The role of each component of the approach is explained, we also study its interactions with the other main components, and their impact on the overall. A case study is presented to highlight the components and interactions of the systemic and cognitive approach. Then, security questions about privacy, trust, identification, and access control are discussed. According to the novel taxonomy of the loT framework, different research challenges are highlighted, important solutions and research activities are revealed, and interesting research directions are proposed. In addition, current stan dardization activities are surveyed and discussed to the ensure the security of loT components and applications.
文摘Many organizations have datasets which contain a high volume of personal data on individuals,e.g.,health data.Even without a name or address,persons can be identified based on the details(variables)on the dataset.This is an important issue for big data holders such as public sector organizations(e.g.,Public Health Organizations)and social media companies.This paper looks at how individuals can be identified from big data using a mathematical approach and how to apply this mathematical solution to prevent accidental disclosure of a person’s details.The mathematical concept is known as the“Identity Correlation Approach”(ICA)and demonstrates how an individual can be identified without a name or address using a unique set of characteristics(variables).Secondly,having identified the individual person,it shows how a solution can be put in place to prevent accidental disclosure of the personal details.Thirdly,how to store data such that accidental leaks of the datasets do not lead to the disclosure of the personal details to unauthorized users.
文摘The Internet of Things is a modern technology that is directed at easing human life by automating most of the things used in daily life.The never-ending dependency on the network for communication is attracting adversaries to exploit the vulnerabilities of IoT.Therefore,this technology is facing some serious issues and challenges concerning security and privacy.These issues and challenges are the real motivation behind considering this study.Hence,this survey includes a discussion about security and privacy challenges as well as available solutions for IoT based wireless sensor networks.This systematic literature review(SLR)focuses particularly on a popular and applicable security approach known as Trust Management System(TMS).Firstly,all aspects of trust management,including trust indicators,trust properties,trust evaluation,trust building,trust models and the importance of those models for security and privacy,trust prediction methodologies,and ultimately trust-based attacks,are covered in this literature.Secondly,trust management schemes are classified into four groups based on the methodology used for trust-based security solutions in the IoT:cryptography-based,computational and probabilistic-based,information theory-based,and others.Then,an understanding of the problems and difficulties with current methodologies is given,along with suggestions for further research.Finally,the SLR is concluded by formulating the desirable characteristics of a trust management system in the IoT and proposing a trust model suitable for IoT networks.