期刊文献+
共找到115篇文章
< 1 2 6 >
每页显示 20 50 100
A Data Security Framework for Cloud Computing Services 被引量:3
1
作者 Luis-Eduardo Bautista-Villalpando Alain Abran 《Computer Systems Science & Engineering》 SCIE EI 2021年第5期203-218,共16页
Cyberattacks are difficult to prevent because the targeted companies and organizations are often relying on new and fundamentally insecure cloudbased technologies,such as the Internet of Things.With increasing industr... Cyberattacks are difficult to prevent because the targeted companies and organizations are often relying on new and fundamentally insecure cloudbased technologies,such as the Internet of Things.With increasing industry adoption and migration of traditional computing services to the cloud,one of the main challenges in cybersecurity is to provide mechanisms to secure these technologies.This work proposes a Data Security Framework for cloud computing services(CCS)that evaluates and improves CCS data security from a software engineering perspective by evaluating the levels of security within the cloud computing paradigm using engineering methods and techniques applied to CCS.This framework is developed by means of a methodology based on a heuristic theory that incorporates knowledge generated by existing works as well as the experience of their implementation.The paper presents the design details of the framework,which consists of three stages:identification of data security requirements,management of data security risks and evaluation of data security performance in CCS. 展开更多
关键词 Cloud computing SERVICES computer security data security data security requirements data risk data security measurement
在线阅读 下载PDF
Classification of Big Data Security Based on Ontology Web Language
2
作者 Alsadig Mohammed Adam Abdallah Amir Mohamed Talib 《Journal of Information Security》 2023年第1期76-91,共16页
A vast amount of data (known as big data) may now be collected and stored from a variety of data sources, including event logs, the internet, smartphones, databases, sensors, cloud computing, and Internet of Things (I... A vast amount of data (known as big data) may now be collected and stored from a variety of data sources, including event logs, the internet, smartphones, databases, sensors, cloud computing, and Internet of Things (IoT) devices. The term “big data security” refers to all the safeguards and instruments used to protect both the data and analytics processes against intrusions, theft, and other hostile actions that could endanger or adversely influence them. Beyond being a high-value and desirable target, protecting Big Data has particular difficulties. Big Data security does not fundamentally differ from conventional data security. Big Data security issues are caused by extraneous distinctions rather than fundamental ones. This study meticulously outlines the numerous security difficulties Large Data analytics now faces and encourages additional joint research for reducing both big data security challenges utilizing Ontology Web Language (OWL). Although we focus on the Security Challenges of Big Data in this essay, we will also briefly cover the broader Challenges of Big Data. The proposed classification of Big Data security based on ontology web language resulting from the protégé software has 32 classes and 45 subclasses. 展开更多
关键词 Big data Big data security Information security data security Ontology Web Language PROTÉGÉ
在线阅读 下载PDF
Data Security Storage Model of the Internet of Things Based on Blockchain 被引量:3
3
作者 Pingshui Wang Willy Susilo 《Computer Systems Science & Engineering》 SCIE EI 2021年第1期213-224,共12页
With the development of information technology,the Internet of Things(IoT)has gradually become the third wave of the worldwide information industry revolution after the computer and the Internet.The application of the... With the development of information technology,the Internet of Things(IoT)has gradually become the third wave of the worldwide information industry revolution after the computer and the Internet.The application of the IoT has brought great convenience to people’s production and life.However,the potential information security problems in various IoT applications are gradually exposed and people pay more attention to them.The traditional centralized data storage and management model of the IoT is easy to cause transmission delay,single point of failure,privacy disclosure and other problems,and eventually leads to unpredictable behavior of the system.Blockchain technology can effectively improve the operation and data security status of the IoT.Referring to the storage model of the Fabric blockchain project,this paper designs a data security storage model suitable for the IoT system.The simulation results show that the model is not only effective and extensible,but also can better protect the data security of the Internet of Things. 展开更多
关键词 Internet of Things(IoT) blockchain data security digital signatures ENCRYPTION MODEL
在线阅读 下载PDF
Data security governance in the era of big data: status, challenges, and prospects 被引量:4
4
作者 Liyuan Sun Hongyun Zhang Chao Fang 《Data Science and Management》 2021年第2期41-44,共4页
At present,the global big data industry is experiencing vibrant development with technological evolution and application innovation speeding up side by side.Novel technologies for data storage,computing and analytics,... At present,the global big data industry is experiencing vibrant development with technological evolution and application innovation speeding up side by side.Novel technologies for data storage,computing and analytics,such as non-relational databases,distributed parallel computing,machine learning,and deep data mining have emerged and evolved rapidly.Big data has gradually become a fundamental national strategic resource and a cornerstone factor in production.However,increasing big data security problems are exposed and the number of big data security incidents occurring around the world is on the rise.Against this background,this paper provides a summary of the present situation of global data security governance,points out the challenges,and then proceeds to raise solutions for further modernizing data security governance systems. 展开更多
关键词 data security Cyber security data sharing data privacy Big data
在线阅读 下载PDF
Protecting Data Mobility in Cloud Networks Using Metadata Security
5
作者 R.Punithavathi M.Kowsigan +3 位作者 R.Shanthakumari Miodrag Zivkovic Nebojsa Bacanin Marko Sarac 《Computer Systems Science & Engineering》 SCIE EI 2022年第7期105-120,共16页
At present,health care applications,government services,and banking applications use big data with cloud storage to process and implement data.Data mobility in cloud environments uses protection protocols and algorith... At present,health care applications,government services,and banking applications use big data with cloud storage to process and implement data.Data mobility in cloud environments uses protection protocols and algorithms to secure sensitive user data.Sometimes,data may have highly sensitive information,lead-ing users to consider using big data and cloud processing regardless of whether they are secured are not.Threats to sensitive data in cloud systems produce high risks,and existing security methods do not provide enough security to sensitive user data in cloud and big data environments.At present,several security solu-tions support cloud systems.Some of them include Hadoop Distributed File Sys-tem(HDFS)baseline Kerberos security,socket layer-based HDFS security,and hybrid security systems,which have time complexity in providing security inter-actions.Thus,mobile data security algorithms are necessary in cloud environ-ments to avoid time risks in providing security.In our study,we propose a data mobility and security(DMoS)algorithm to provide security of data mobility in cloud environments.By analyzing metadata,data are classified as secured and open data based on their importance.Secured data are sensitive user data,whereas open data are open to the public.On the basis of data classification,secured data are applied to the DMoS algorithm to achieve high security in HDFS.The pro-posed approach is compared with the time complexity of three existing algo-rithms,and results are evaluated. 展开更多
关键词 data mobility data security cloud computing big data DMoS algorithm
在线阅读 下载PDF
Towards Developing Privacy-Preserved Data Security Approach(PP-DSA)in Cloud Computing Environment
6
作者 S.Stewart Kirubakaran V.P.Arunachalam +1 位作者 S.Karthik S.K annan 《Computer Systems Science & Engineering》 SCIE EI 2023年第3期1881-1895,共15页
In the present scenario of rapid growth in cloud computing models,several companies and users started to share their data on cloud servers.However,when the model is not completely trusted,the data owners face several ... In the present scenario of rapid growth in cloud computing models,several companies and users started to share their data on cloud servers.However,when the model is not completely trusted,the data owners face several security-related problems,such as user privacy breaches,data disclosure,data corruption,and so on,during the process of data outsourcing.For addressing and handling the security-related issues on Cloud,several models were proposed.With that concern,this paper develops a Privacy-Preserved Data Security Approach(PP-DSA)to provide the data security and data integrity for the out-sourcing data in Cloud Environment.Privacy preservation is ensured in this work with the Efficient Authentication Technique(EAT)using the Group Signature method that is applied with Third-Party Auditor(TPA).The role of the auditor is to secure the data and guarantee shared data integrity.Additionally,the Cloud Service Provider(CSP)and Data User(DU)can also be the attackers that are to be handled with the EAT.Here,the major objective of the work is to enhance cloud security and thereby,increase Quality of Service(QoS).The results are evaluated based on the model effectiveness,security,and reliability and show that the proposed model provides better results than existing works. 展开更多
关键词 Third-party auditor(TPA) efficient auditing technique(EAT) cloud service provider(CSP) data user(DU) data security PRIVACY-PRESERVING cloud computing cloud security
在线阅读 下载PDF
Data Security and Privacy in Cloud Storage
7
作者 Xinhua Dong Ruixuan Li +2 位作者 Wanwan Zhou Dongjie Liao Shuoyi Zhao 《ZTE Communications》 2013年第2期18-23,共6页
In this paper, we survey data security and privacy problems created by cloud storage applications and propose a cloud storage security architecture. We discuss state-of-the-art techniques for ensuring the privacy and ... In this paper, we survey data security and privacy problems created by cloud storage applications and propose a cloud storage security architecture. We discuss state-of-the-art techniques for ensuring the privacy and security of data stored in the cloud. We discuss policies for access control and data integrity, availability, and privacy. We also discuss several key solutions proposed in current literature and point out future research directions. 展开更多
关键词 cloud storage cloud computing data security PRIVACY-PRESERVING
在线阅读 下载PDF
Block Level Data Integrity Assurance Using Matrix Dialing Method towards High Performance Data Security on Cloud Storage
8
作者 P. Premkumar D. Shanthi 《Circuits and Systems》 2016年第11期3626-3644,共19页
Data outsourcing through cloud storage enables the users to share on-demand resources with cost effective IT services but several security issues arise like confidentiality, integrity and authentication. Each of them ... Data outsourcing through cloud storage enables the users to share on-demand resources with cost effective IT services but several security issues arise like confidentiality, integrity and authentication. Each of them plays an important role in the successful achievement of the other. In cloud computing data integrity assurance is one of the major challenges because the user has no control over the security mechanism to protect the data. Data integrity insures that data received are the same as data stored. It is a result of data security but data integrity refers to validity and accuracy of data rather than protect the data. Data security refers to protection of data against unauthorized access, modification or corruption and it is necessary to ensure data integrity. This paper proposed a new approach using Matrix Dialing Method in block level to enhance the performance of both data integrity and data security without using Third Party Auditor (TPA). In this approach, the data are partitioned into number of blocks and each block converted into a square matrix. Determinant factor of each matrix is generated dynamically to ensure data integrity. This model also implements a combination of AES algorithm and SHA-1 algorithm for digital signature generation. Data coloring on digital signature is applied to ensure data security with better performance. The performance analysis using cloud simulator shows that the proposed scheme is highly efficient and secure as it overcomes the limitations of previous approaches of data security using encryption and decryption algorithms and data integrity assurance using TPA due to server computation time and accuracy. 展开更多
关键词 Cloud Computing data Integrity data security SHA-1 Digital Signature AES Encryption and Decryption
在线阅读 下载PDF
Proof of Activity Protocol for IoMT Data Security
9
作者 R.Rajadevi K.Venkatachalam +2 位作者 Mehedi Masud Mohammed A.AlZain Mohamed Abouhawwash 《Computer Systems Science & Engineering》 SCIE EI 2023年第1期339-350,共12页
The Internet of Medical Things(IoMT)is an online device that senses and transmits medical data from users to physicians within a time interval.In,recent years,IoMT has rapidly grown in the medicalfield to provide heal... The Internet of Medical Things(IoMT)is an online device that senses and transmits medical data from users to physicians within a time interval.In,recent years,IoMT has rapidly grown in the medicalfield to provide healthcare services without physical appearance.With the use of sensors,IoMT applications are used in healthcare management.In such applications,one of the most important factors is data security,given that its transmission over the network may cause obtrusion.For data security in IoMT systems,blockchain is used due to its numerous blocks for secure data storage.In this study,Blockchain-assisted secure data management framework(BSDMF)and Proof of Activity(PoA)protocol using malicious code detection algorithm is used in the proposed data security for the healthcare system.The main aim is to enhance the data security over the networks.The PoA protocol enhances high security of data from the literature review.By replacing the malicious node from the block,the PoA can provide high security for medical data in the blockchain.Comparison with existing systems shows that the proposed simulation with BSD-Malicious code detection algorithm achieves higher accuracy ratio,precision ratio,security,and efficiency and less response time for Blockchain-enabled healthcare systems. 展开更多
关键词 Blockchain IoMT malicious code detection security secure data management framework data management POA
在线阅读 下载PDF
SEIZING THE OPPORTUNITIES OF GOOD GOVERNANCE UNDER THE RULE OF LAW,AND ENJOYING THE ACHIEVEMENTS OF THE DIGITAL DEVELOPMENT:CTRIP'S BUSINESS PRACTICES IN DATA SECURITY AND PRIVACY PROTECTION
10
作者 Wang Xin Liu Yan 《China Legal Science》 2025年第2期33-39,共7页
Ctrip was founded in Shanghai in 1999.Thanks to the rapid development of China's Internet and the continuous improvement in cyberspace rule of law,Ctrip has seized the opportunity to thrive in the online travel in... Ctrip was founded in Shanghai in 1999.Thanks to the rapid development of China's Internet and the continuous improvement in cyberspace rule of law,Ctrip has seized the opportunity to thrive in the online travel industry and has been constantly developing in a standardized manner.In recent years,with revolutionary innovations in the field of artificial intelligence and the high-quality development of cyberspace rule of law that provides strong protection,Ctrip and other Internet enterprises have been able to fully focus on breaking through new technologies,planning new scenarios,providing new services,and achieving new developments.We have reflected on personal information and data systems. 展开更多
关键词 data security cyberspace rule lawctrip good governance developing standardized mannerin digital development artificial intelligence privacy protection
原文传递
Adaptive Attribute-Based Honey Encryption: A Novel Solution for Cloud Data Security
11
作者 Reshma Siyal Muhammad Asim +4 位作者 Long Jun Mohammed Elaffendi Sundas Iftikhar Rana Alnashwan Samia Allaoua Chelloug 《Computers, Materials & Continua》 2025年第2期2637-2664,共28页
A basic procedure for transforming readable data into encoded forms is encryption, which ensures security when the right decryption keys are used. Hadoop is susceptible to possible cyber-attacks because it lacks built... A basic procedure for transforming readable data into encoded forms is encryption, which ensures security when the right decryption keys are used. Hadoop is susceptible to possible cyber-attacks because it lacks built-in security measures, even though it can effectively handle and store enormous datasets using the Hadoop Distributed File System (HDFS). The increasing number of data breaches emphasizes how urgently creative encryption techniques are needed in cloud-based big data settings. This paper presents Adaptive Attribute-Based Honey Encryption (AABHE), a state-of-the-art technique that combines honey encryption with Ciphertext-Policy Attribute-Based Encryption (CP-ABE) to provide improved data security. Even if intercepted, AABHE makes sure that sensitive data cannot be accessed by unauthorized parties. With a focus on protecting huge files in HDFS, the suggested approach achieves 98% security robustness and 95% encryption efficiency, outperforming other encryption methods including Ciphertext-Policy Attribute-Based Encryption (CP-ABE), Key-Policy Attribute-Based Encryption (KB-ABE), and Advanced Encryption Standard combined with Attribute-Based Encryption (AES+ABE). By fixing Hadoop’s security flaws, AABHE fortifies its protections against data breaches and enhances Hadoop’s dependability as a platform for processing and storing massive amounts of data. 展开更多
关键词 Cybersecurity data security cloud storage hadoop encryption and decryption privacy protection attribute-based honey encryption
在线阅读 下载PDF
DNACDS:Cloud IoE big data security and accessing scheme based on DNA cryptography 被引量:3
12
作者 Ashish SINGH Abhinav KUMAR Suyel NAMASUDRA 《Frontiers of Computer Science》 SCIE EI CSCD 2024年第1期157-170,共14页
The Internet of Everything(IoE)based cloud computing is one of the most prominent areas in the digital big data world.This approach allows efficient infrastructure to store and access big real-time data and smart IoE ... The Internet of Everything(IoE)based cloud computing is one of the most prominent areas in the digital big data world.This approach allows efficient infrastructure to store and access big real-time data and smart IoE services from the cloud.The IoE-based cloud computing services are located at remote locations without the control of the data owner.The data owners mostly depend on the untrusted Cloud Service Provider(CSP)and do not know the implemented security capabilities.The lack of knowledge about security capabilities and control over data raises several security issues.Deoxyribonucleic Acid(DNA)computing is a biological concept that can improve the security of IoE big data.The IoE big data security scheme consists of the Station-to-Station Key Agreement Protocol(StS KAP)and Feistel cipher algorithms.This paper proposed a DNA-based cryptographic scheme and access control model(DNACDS)to solve IoE big data security and access issues.The experimental results illustrated that DNACDS performs better than other DNA-based security schemes.The theoretical security analysis of the DNACDS shows better resistance capabilities. 展开更多
关键词 IoE based cloud computing DNA cryptography IoE big data security StS KAP feistel cipher IoE big data access
原文传递
Review of data security within energy blockchain:A comprehensive analysis of storage,management,and utilization
13
作者 Yunhua He Zhihao Zhou +4 位作者 Yan Pan Fahui Chong Bin Wu Ke Xiao Hong Li 《High-Confidence Computing》 EI 2024年第3期82-102,共21页
Energy systems are currently undergoing a transformation towards new paradigms characterized by decarbonization,decentralization,democratization,and digitalization.In this evolving context,energy blockchain,aiming to ... Energy systems are currently undergoing a transformation towards new paradigms characterized by decarbonization,decentralization,democratization,and digitalization.In this evolving context,energy blockchain,aiming to enhance efficiency,transparency,and security,emerges as an integrated technological solution designed to address the diverse challenges in this field.Data security is essential for the reliable and efficient functioning of energy blockchain.The pressing need to address challenges related to secure data storage,effective data management,and efficient data utilization is increasingly vital.This paper offers a comprehensive survey of academic discourse on energy blockchain data security over the past five years,adopting an all-encompassing perspective that spans data storage,management,and utilization.Our work systematically evaluates and contrasts the strengths and weaknesses of various research methodologies.Additionally,this paper proposes an integrated hierarchical on-chain and off-chain security energy blockchain architecture,specifically designed to meet the complex security requirements of multi-blockchain business environments.Concludingly,this paper identifies key directions for future research,particularly in advancing the integration of storage,management,and utilization of energy blockchain data security. 展开更多
关键词 Energy blockchain data security STORAGE MANAGEMENT UTILIZATION
原文传递
Personal data security and stock crash risk:Evidence from China’s Cybersecurity Law
14
作者 Ziwei Song 《China Journal of Accounting Research》 2024年第4期1-23,共23页
Using China’s Cybersecurity Law(CSL)as an exogenous shock,I examine how personal data security affects stock crash risk.I find that the stock crash risk of treatment firms(which collect personal data)significantly de... Using China’s Cybersecurity Law(CSL)as an exogenous shock,I examine how personal data security affects stock crash risk.I find that the stock crash risk of treatment firms(which collect personal data)significantly decreases after the CSL,and such decrease is larger when firms face greater personal data breach risk and have less transparent information environments before the CSL.Furthermore,treatment firms increase their investment in personal data protection after the CSL.Finally,enhanced personal data security increases firm value and promotes firms’social responsibility to stakeholders.Overall,I provide evidence of the importance of data security for the digital economy from the perspective of capital market stability,which may present implica-tions for data security policy worldwide. 展开更多
关键词 Personal data data security Stock Crash Risk Cybersecurity Law
原文传递
AI-Enhanced Secure Data Aggregation for Smart Grids with Privacy Preservation
15
作者 Congcong Wang Chen Wang +1 位作者 Wenying Zheng Wei Gu 《Computers, Materials & Continua》 SCIE EI 2025年第1期799-816,共18页
As smart grid technology rapidly advances,the vast amount of user data collected by smart meter presents significant challenges in data security and privacy protection.Current research emphasizes data security and use... As smart grid technology rapidly advances,the vast amount of user data collected by smart meter presents significant challenges in data security and privacy protection.Current research emphasizes data security and user privacy concerns within smart grids.However,existing methods struggle with efficiency and security when processing large-scale data.Balancing efficient data processing with stringent privacy protection during data aggregation in smart grids remains an urgent challenge.This paper proposes an AI-based multi-type data aggregation method designed to enhance aggregation efficiency and security by standardizing and normalizing various data modalities.The approach optimizes data preprocessing,integrates Long Short-Term Memory(LSTM)networks for handling time-series data,and employs homomorphic encryption to safeguard user privacy.It also explores the application of Boneh Lynn Shacham(BLS)signatures for user authentication.The proposed scheme’s efficiency,security,and privacy protection capabilities are validated through rigorous security proofs and experimental analysis. 展开更多
关键词 Smart grid data security privacy protection artificial intelligence data aggregation
在线阅读 下载PDF
Designing a Comprehensive Data Governance Maturity Model for Kenya Ministry of Defence
16
作者 Gilly Gitahi Gathogo Simon Maina Karume Josphat Karani 《Journal of Information Security》 2025年第1期44-69,共26页
The study aimed to develop a customized Data Governance Maturity Model (DGMM) for the Ministry of Defence (MoD) in Kenya to address data governance challenges in military settings. Current frameworks lack specific req... The study aimed to develop a customized Data Governance Maturity Model (DGMM) for the Ministry of Defence (MoD) in Kenya to address data governance challenges in military settings. Current frameworks lack specific requirements for the defence industry. The model uses Key Performance Indicators (KPIs) to enhance data governance procedures. Design Science Research guided the study, using qualitative and quantitative methods to gather data from MoD personnel. Major deficiencies were found in data integration, quality control, and adherence to data security regulations. The DGMM helps the MOD improve personnel, procedures, technology, and organizational elements related to data management. The model was tested against ISO/IEC 38500 and recommended for use in other government sectors with similar data governance issues. The DGMM has the potential to enhance data management efficiency, security, and compliance in the MOD and guide further research in military data governance. 展开更多
关键词 data Governance Maturity Model Maturity Index Kenya Ministry of Defence Key Performance Indicators data security Regulations
在线阅读 下载PDF
Data Hiding and Security for XMLDatabase: A TRBAC-Based Approach 被引量:1
17
作者 ZHANGWan-song SUNWei LIUDa-xin 《Wuhan University Journal of Natural Sciences》 CAS 2005年第1期293-296,共4页
In order to cope with varying protection granularity levels of XML(extensible Markup Language) documents, we propose a TXAC (Two-level XML. Access Control) framework,in which an extended TRBAC ( Temporal Role-Based Ac... In order to cope with varying protection granularity levels of XML(extensible Markup Language) documents, we propose a TXAC (Two-level XML. Access Control) framework,in which an extended TRBAC ( Temporal Role-Based Access Control) approach is proposed to deal withthe dynamic XML data With different system components, LXAC algorithm evaluates access requestsefficiently by appropriate access control policy in dynamic web environment. The method is aflexible and powerful security system offering amulti-level access control solution. 展开更多
关键词 XML data access control data security
在线阅读 下载PDF
Hadoop-based secure storage solution for big data in cloud computing environment 被引量:1
18
作者 Shaopeng Guan Conghui Zhang +1 位作者 Yilin Wang Wenqing Liu 《Digital Communications and Networks》 SCIE CSCD 2024年第1期227-236,共10页
In order to address the problems of the single encryption algorithm,such as low encryption efficiency and unreliable metadata for static data storage of big data platforms in the cloud computing environment,we propose... In order to address the problems of the single encryption algorithm,such as low encryption efficiency and unreliable metadata for static data storage of big data platforms in the cloud computing environment,we propose a Hadoop based big data secure storage scheme.Firstly,in order to disperse the NameNode service from a single server to multiple servers,we combine HDFS federation and HDFS high-availability mechanisms,and use the Zookeeper distributed coordination mechanism to coordinate each node to achieve dual-channel storage.Then,we improve the ECC encryption algorithm for the encryption of ordinary data,and adopt a homomorphic encryption algorithm to encrypt data that needs to be calculated.To accelerate the encryption,we adopt the dualthread encryption mode.Finally,the HDFS control module is designed to combine the encryption algorithm with the storage model.Experimental results show that the proposed solution solves the problem of a single point of failure of metadata,performs well in terms of metadata reliability,and can realize the fault tolerance of the server.The improved encryption algorithm integrates the dual-channel storage mode,and the encryption storage efficiency improves by 27.6% on average. 展开更多
关键词 Big data security data encryption HADOOP Parallel encrypted storage Zookeeper
在线阅读 下载PDF
Evaluating Security of Big Data Through Fuzzy Based Decision-Making Technique
19
作者 Fawaz Alassery Ahmed Alzahrani +3 位作者 Asif Irshad Khan Kanika Sharma Masood Ahmad Raees Ahmad Khan 《Computer Systems Science & Engineering》 SCIE EI 2023年第1期859-872,共14页
In recent years,it has been observed that the disclosure of information increases the risk of terrorism.Without restricting the accessibility of information,providing security is difficult.So,there is a demand for tim... In recent years,it has been observed that the disclosure of information increases the risk of terrorism.Without restricting the accessibility of information,providing security is difficult.So,there is a demand for time tofill the gap between security and accessibility of information.In fact,security tools should be usable for improving the security as well as the accessibility of information.Though security and accessibility are not directly influenced,some of their factors are indirectly influenced by each other.Attributes play an important role in bridging the gap between security and accessibility.In this paper,we identify the key attributes of accessibility and security that impact directly and indirectly on each other,such as confidentiality,integrity,availability,and severity.The significance of every attribute on the basis of obtained weight is important for its effect on security during the big data security life cycle process.To calculate the proposed work,researchers utilised the Fuzzy Analytic Hierarchy Process(Fuzzy AHP).Thefindings show that the Fuzzy AHP is a very accurate mechanism for determining the best security solution in a real-time healthcare context.The study also looks at the rapidly evolving security technologies in healthcare that could help improve healthcare services and the future prospects in this area. 展开更多
关键词 Information security big data big data security life cycle fuzzy AHP
在线阅读 下载PDF
Trusted Certified Auditor Using Cryptography for Secure Data Outsourcing and Privacy Preservation in Fog-Enabled VANETs
20
作者 Nagaraju Pacharla K.Srinivasa Reddy 《Computers, Materials & Continua》 SCIE EI 2024年第5期3089-3110,共22页
With the recent technological developments,massive vehicular ad hoc networks(VANETs)have been established,enabling numerous vehicles and their respective Road Side Unit(RSU)components to communicate with oneanother.Th... With the recent technological developments,massive vehicular ad hoc networks(VANETs)have been established,enabling numerous vehicles and their respective Road Side Unit(RSU)components to communicate with oneanother.The best way to enhance traffic flow for vehicles and traffic management departments is to share thedata they receive.There needs to be more protection for the VANET systems.An effective and safe methodof outsourcing is suggested,which reduces computation costs by achieving data security using a homomorphicmapping based on the conjugate operation of matrices.This research proposes a VANET-based data outsourcingsystem to fix the issues.To keep data outsourcing secure,the suggested model takes cryptography models intoaccount.Fog will keep the generated keys for the purpose of vehicle authentication.For controlling and overseeingthe outsourced data while preserving privacy,the suggested approach considers the Trusted Certified Auditor(TCA).Using the secret key,TCA can identify the genuine identity of VANETs when harmful messages aredetected.The proposed model develops a TCA-based unique static vehicle labeling system using cryptography(TCA-USVLC)for secure data outsourcing and privacy preservation in VANETs.The proposed model calculatesthe trust of vehicles in 16 ms for an average of 180 vehicles and achieves 98.6%accuracy for data encryption toprovide security.The proposedmodel achieved 98.5%accuracy in data outsourcing and 98.6%accuracy in privacypreservation in fog-enabled VANETs.Elliptical curve cryptography models can be applied in the future for betterencryption and decryption rates with lightweight cryptography operations. 展开更多
关键词 Vehicular ad-hoc networks data outsourcing privacy preservation CRYPTOGRAPHY keys trusted certified auditors data security
在线阅读 下载PDF
上一页 1 2 6 下一页 到第
使用帮助 返回顶部