Atier more than a quarter-century of market-oriented economic policies and unprecedented economic growths, China on March 15, 2007enacted its first law that provides equal legal safeguards to both public and private p...Atier more than a quarter-century of market-oriented economic policies and unprecedented economic growths, China on March 15, 2007enacted its first law that provides equal legal safeguards to both public and private properties. The 247-article People's Republic of China Property Law, which is due to come into effect as of October 1, 2007, stipulates that "the property of the State, the collecfive, the individual and other obligees shall be protected by law, and no units or individuals may infringe upon it".展开更多
Food safety has received a great deal of attention in both developed and developing countries in recent years. In China, the numerous food scandals and scares that have struck over the past decade have spurred signifi...Food safety has received a great deal of attention in both developed and developing countries in recent years. In China, the numerous food scandals and scares that have struck over the past decade have spurred significant food safety regulatory reform, which has been increasingly oriented towards the public-private partnership model adopted by the Europe Union's (EU) food safety regulatory system. This paper analyzes the development of both the EU's and China's food safety regu- latory systems, identifies the current challenges for China and additionally considers the role of public-private partnership. The success of co-regulation in the food regulatory system would bring significant benefits and opportunities for China. Finally, this paper recommends additional measures like training and grants to improve the private's sector effectiveness in co-regulating China's food safety issues.展开更多
The Internet of Things (IoT) and Cloud computing are gaining popularity due to their numerous advantages, including the efficient utilization of internetand computing resources. In recent years, many more IoT applicat...The Internet of Things (IoT) and Cloud computing are gaining popularity due to their numerous advantages, including the efficient utilization of internetand computing resources. In recent years, many more IoT applications have beenextensively used. For instance, Healthcare applications execute computations utilizing the user’s private data stored on cloud servers. However, the main obstaclesfaced by the extensive acceptance and usage of these emerging technologies aresecurity and privacy. Moreover, many healthcare data management system applications have emerged, offering solutions for distinct circumstances. But still, theexisting system has issues with specific security issues, privacy-preserving rate,information loss, etc. Hence, the overall system performance is reduced significantly. A unique blockchain-based technique is proposed to improve anonymityin terms of data access and data privacy to overcome the above-mentioned issues.Initially, the registration phase is done for the device and the user. After that, theGeo-Location and IP Address values collected during registration are convertedinto Hash values using Adler 32 hashing algorithm, and the private and publickeys are generated using the key generation centre. Then the authentication is performed through login. The user then submits a request to the blockchain server,which redirects the request to the associated IoT device in order to obtain thesensed IoT data. The detected data is anonymized in the device and stored inthe cloud server using the Linear Scaling based Rider Optimization algorithmwith integrated KL Anonymity (LSR-KLA) approach. After that, the Time-stamp-based Public and Private Key Schnorr Signature (TSPP-SS) mechanismis used to permit the authorized user to access the data, and the blockchain servertracks the entire transaction. The experimental findings showed that the proposedLSR-KLA and TSPP-SS technique provides better performance in terms of higherprivacy-preserving rate, lower information loss, execution time, and Central Processing Unit (CPU) usage than the existing techniques. Thus, the proposed method allows for better data privacy in the smart healthcare network.展开更多
文摘Atier more than a quarter-century of market-oriented economic policies and unprecedented economic growths, China on March 15, 2007enacted its first law that provides equal legal safeguards to both public and private properties. The 247-article People's Republic of China Property Law, which is due to come into effect as of October 1, 2007, stipulates that "the property of the State, the collecfive, the individual and other obligees shall be protected by law, and no units or individuals may infringe upon it".
基金provided by the CGIAR Research Program on Policies, Institutions, and Marketsby the National Natural Science Foundation of China (NSFC) Program on "Food Value Chain Upgrading for Food Safety in Transforming Food Markets" (71273269)
文摘Food safety has received a great deal of attention in both developed and developing countries in recent years. In China, the numerous food scandals and scares that have struck over the past decade have spurred significant food safety regulatory reform, which has been increasingly oriented towards the public-private partnership model adopted by the Europe Union's (EU) food safety regulatory system. This paper analyzes the development of both the EU's and China's food safety regu- latory systems, identifies the current challenges for China and additionally considers the role of public-private partnership. The success of co-regulation in the food regulatory system would bring significant benefits and opportunities for China. Finally, this paper recommends additional measures like training and grants to improve the private's sector effectiveness in co-regulating China's food safety issues.
文摘The Internet of Things (IoT) and Cloud computing are gaining popularity due to their numerous advantages, including the efficient utilization of internetand computing resources. In recent years, many more IoT applications have beenextensively used. For instance, Healthcare applications execute computations utilizing the user’s private data stored on cloud servers. However, the main obstaclesfaced by the extensive acceptance and usage of these emerging technologies aresecurity and privacy. Moreover, many healthcare data management system applications have emerged, offering solutions for distinct circumstances. But still, theexisting system has issues with specific security issues, privacy-preserving rate,information loss, etc. Hence, the overall system performance is reduced significantly. A unique blockchain-based technique is proposed to improve anonymityin terms of data access and data privacy to overcome the above-mentioned issues.Initially, the registration phase is done for the device and the user. After that, theGeo-Location and IP Address values collected during registration are convertedinto Hash values using Adler 32 hashing algorithm, and the private and publickeys are generated using the key generation centre. Then the authentication is performed through login. The user then submits a request to the blockchain server,which redirects the request to the associated IoT device in order to obtain thesensed IoT data. The detected data is anonymized in the device and stored inthe cloud server using the Linear Scaling based Rider Optimization algorithmwith integrated KL Anonymity (LSR-KLA) approach. After that, the Time-stamp-based Public and Private Key Schnorr Signature (TSPP-SS) mechanismis used to permit the authorized user to access the data, and the blockchain servertracks the entire transaction. The experimental findings showed that the proposedLSR-KLA and TSPP-SS technique provides better performance in terms of higherprivacy-preserving rate, lower information loss, execution time, and Central Processing Unit (CPU) usage than the existing techniques. Thus, the proposed method allows for better data privacy in the smart healthcare network.