Filters








20,706 Hits in 7.7 sec

Towards a Decentralized OSN for a Privacy-preserving e-health System

Yahya Benkaouz, Mohammed Erradi
2015 Procedia Computer Science  
Due to the sensitivity of health data exchanged over such networks, a special attention need to be paid to security and privacy aspects of these data.  ...  In this work, we suggest a layered architecture while promoting the usage of decentralized design to ensure the scalability and the privacy of an OSN-based e-health system.  ...  Thus, we promote the usage of fully decentralized or hybrid architecture to ensure the scalability and the privacy of the e-health system.  ... 
doi:10.1016/j.procs.2015.08.345 fatcat:tliefoylvbasjobb7so7z6n3li

Blockchain: a secure, decentralized, trusted cyber infrastructure solution for future energy systems

Zhaoyang DONG, Fengji LUO, Gaoqi LIANG
2018 Journal of Modern Power Systems and Clean Energy  
This paper gives a prospective on using Blockchain as a secure, distributed cyber infrastructure for the future grid.  ...  The increasingly complex interaction among different energy entities calls for a secure, efficient, and robust cyber infrastructure.  ...  Yang Chen from the Microsoft Asia for his comments on Blockchain.  ... 
doi:10.1007/s40565-018-0418-0 fatcat:uklkiuqhvrcytoyuiwqwxxh5gy

Can Blockchain Strengthen the Energy Internet?

Charithri Yapa, Chamitha de Alwis, Madhusanka Liyanage
2021 Network  
Furthermore, we summarize the future research directive in achieving fully autonomous and decentralized electricity distribution networks, which will be known as Energy Internet.  ...  management.  ...  Secure communication: How can we manage secure communication links and storage for large energy data aggregation arising from the increasing number of grid interconnections in a decentralized and secure  ... 
doi:10.3390/network1020007 fatcat:mxpgibkapfg6nnxvk5il4qnwaa

OFELIA – A Secure Mobile Attribute Aggregation Infrastructure for User-Centric Identity Management [chapter]

Alexandre B. Augusto, Manuel Eduardo Correia
2012 IFIP Advances in Information and Communication Technology  
data.  ...  In this paper we describe OFELIA (Open Federated Environment for Leveraging of Identity and Authorization), a framework for user centric identity management that provides an identity/authorization versatile  ...  These characteristics of identity data lead us to propose the development of a fully decentralized privacy and user oriented model for identity management.  ... 
doi:10.1007/978-3-642-30436-1_6 fatcat:ys3vzanrp5cordayfftzjfq2nq

A Critical Look at Decentralized Personal Data Architectures [article]

Arvind Narayanan and Vincent Toubiana and Solon Barocas and Helen Nissenbaum and Dan Boneh
2012 arXiv   pre-print
And yet, for all these efforts, decentralized personal data architectures have seen little adoption.  ...  The result has been a great variety of solutions that include personal data stores (PDS), infomediaries, Vendor Relationship Management (VRM) systems, and federated and distributed social networks.  ...  a multi-factor approach to privacy, Alejandro Molnar for general education about economics, Alessandro Acquisti for sharing his bibliography on the economics of privacy and numerous online commenters for  ... 
arXiv:1202.4503v1 fatcat:sgqjd2pkdrfzdpbgfngfg5jgzm

MRBAC: Hierarchical Role Management and Security Access Control for Distributed Multimedia Systems

Na Zhao, Min Chen, Shu-Ching Chen, Mei-Ling Shyu
2008 2008 11th IEEE International Symposium on Object and Component-Oriented Real-Time Distributed Computing (ISORC)  
In summary, MRBAC can: 1) support the multi-level security protection for multimedia data; 2) provide access control by checking both the time constrains and IP addresses; and 3) decentralize the administration  ...  The object-oriented concept is adopted in MRBAC to perform the hybrid role hierarchy management and security roles and rules administration.  ...  Therefore, it is essential to support security management of multimedia systems and design security models accordingly.  ... 
doi:10.1109/isorc.2008.41 dblp:conf/isorc/ZhaoCCS08 fatcat:k6otxptezfbhxco7k77adzmxjq

Survey on Blockchain for Smart Grid Management, Control, and Operation

Yohannes T. Aklilu, Jianguo Ding
2021 Energies  
: collaboration among stakeholders; data analysis and data management; control of grid imbalances; decentralization of grid management and operations; and security and privacy.  ...  This paper provides a comprehensive overview of blockchain-based solutions for smart grid management, control, and operations.  ...  The funders had no role in the design of the study; in the collection, analyses, or interpretation of data; in the writing of the manuscript, or in the decision to publish the results.  ... 
doi:10.3390/en15010193 fatcat:ycuyl6albnaixhxqwmipffdcv4

Private and Scalable Execution of SQL Aggregates on a Secure Decentralized Architecture

Quoc-Cuong To, Benjamin Nguyen, Philippe Pucheral
2016 ACM Transactions on Database Systems  
Private and Scalable Execution of SQL Aggregates on a Secure Decentralized Architecture  QUOC-CUONG TO, Inria and University of Versailles St-Quentin, PRiSM lab BENJAMIN NGUYEN, INSA Centre Val de Loire  ...  The new material covers a set of important problems that need to be solved to make the approach practical: cryptographic key management, accuracy and latency of the collection phase, access control management  ...  ACKNOWLEDGMENTS The authors wish to thank Anne Cantaut from INRIA-SECRET team and Matthieu Finiasz from CryptoExperts for their help in defining and proving the security of our GKE protocol, and Philippe  ... 
doi:10.1145/2894750 fatcat:r77h6y2jkfdfjjwxhypjqixbdy

SCOR: A secure international informatics infrastructure to investigate COVID-19

J L Raisaro, Francesco Marino, Juan Troncoso-Pastoriza, Raphaelle Beau-Lejdstrom, Riccardo Bellazzi, Robert Murphy, Elmer V Bernstam, Henry Wang, Mauro Bucalo, Yong Chen, Assaf Gottlieb, Arif Harmanci (+22 others)
2020 JAMIA Journal of the American Medical Informatics Association  
Global pandemics call for large and diverse healthcare data to study various risk factors, treatment options, and disease progression patterns.  ...  Existing health informatics systems do not incorporate the latest progress in modern security and federated machine learning algorithms, which are poised to offer solutions.  ...  decentralized international aggregate-level local obfuscation manual analysis ACT Network cohort exploration decentralized national (USA) aggregate-level local obfuscation fully automated system (SHRI  ... 
doi:10.1093/jamia/ocaa172 pmid:32918447 pmcid:PMC7454652 fatcat:kol6vnbybvaz5i4sca322kcy4e

From Distributed Machine Learning to Federated Learning: A Survey [article]

Ji Liu, Jizhou Huang, Yang Zhou, Xuhong Li, Shilei Ji, Haoyi Xiong, Dejing Dou
2022 arXiv   pre-print
ensuring data security and data privacy.  ...  Furthermore, we present the distributed training, data communication, and security of FL systems. Finally, we analyze their limitations and propose future research directions.  ...  The FL system manages the physical resources through the infrastructure layer for the distributed training.  ... 
arXiv:2104.14362v3 fatcat:sgip6r7vy5djpfapk74jygldni

A Decentralized Identity-Based Blockchain Solution for Privacy-Preserving Licensing of Individual-Controlled Data to Prevent Unauthorized Secondary Data Usage

Meng Kang, Victoria Lemieux
2021 Ledger  
Specifically, our design covers necessary roles in the data-sharing ecosystem: the issuer of personal data, the individual holder of the personal data (i.e., the data subject), a trusted data storage manager  ...  In respect to confidential computing, the Cheon-Kim-Kim-Song (CKKS) fully homomorphic encryption (FHE) scheme is incorporated with the system to protect the privacy of the individual's data and prevent  ...  Acknowledgements The authors would like to thank the two anonymous reviewers of this paper and acknowledge the financial support for this research of The Natural Sciences and Engineering Research Council  ... 
doi:10.5195/ledger.2021.239 fatcat:iylkc57rgzbqzdrmiow543bdfu

In Search of Self-Sovereign Identity Leveraging Blockchain Technology

Md Sadek Ferdous, Farida Chowdhury, Madini O. Alassafi
2019 IEEE Access  
INDEX TERMS Identity, identity management system, self-sovereign identity, blockchain.  ...  It also highlights the essential life-cycles of an identity management system and inter-relates how the notion of self-sovereign identity can be applied in these life-cycles.  ...  One may ask about the practicality of such a system: particularly, if a self-sovereign identity management system can be realized in practice.  ... 
doi:10.1109/access.2019.2931173 fatcat:eudvey2hezfsrhetkzs7o4czma

A Blockchain and Artificial Intelligence-Based, Patient-Centric Healthcare System for Combating the COVID-19 Pandemic: Opportunities and Applications

Mohamed Yaseen Jabarulla, Heung-No Lee
2021 Healthcare  
Blockchain could combat pandemics by enabling decentralized healthcare data sharing, protecting users' privacy, providing data empowerment, and ensuring reliable data management during outbreak tracking  ...  Thus, the COVID-19 situation has forced research institutes and countries to rethink healthcare delivery solutions to ensure continuity of services while people stay at home and practice social distancing  ...  For example, Health Wizz [77] uses blockchain to tokenize data to enable patients to securely aggregate, share, donate, trade, and organize their PHR.  ... 
doi:10.3390/healthcare9081019 fatcat:orckfwuvlrc2tfu2oocgzbifmu

Microgrid Transactive Energy: Review, Architectures, Distributed Ledger Technologies, and Market Analysis

Muhammad F. Zia, Mohamed Benbouzid, Elhoussin Elbouchikhi, S. M. Muyeen, Kuaanan Techato, Josep M. Guerrero
2020 IEEE Access  
Distributed energy resources, demand response, distributed ledger technologies, and local energy markets are integral parts of transaction energy system for emergence of decentralized smart grid system  ...  The proposed architecture is compared with practical case study of Brooklyn microgrid.  ...  A fully decentralized energy system can be practically realized by using DLT, as it is used in Bitcoin for achieving decentralized financial system [36] .  ... 
doi:10.1109/access.2020.2968402 fatcat:pctuebol2vaxxmunpqypnfvcdi

Integrating Cloud Computing Services Using Enterprise Service Bus (ESB)

Liqiang Chen
2012 Business and Management Research  
business process management across disparate systems.  ...  In practice, the industry lacks a comprehensive systems integration architecture or tools that can integrate any system universally.  ...  API is primarily used for data exchange between systems and lacks security management. Moreover, the industry lacks standards for API due to systems being greatly different and proprietary.  ... 
doi:10.5430/bmr.v1n1p26 fatcat:nx7nz7lfo5dipiaqqv7s5m27lu
« Previous Showing results 1 — 15 out of 20,706 results