secure storage
Recently Published Documents


TOTAL DOCUMENTS

343
(FIVE YEARS 138)

H-INDEX

12
(FIVE YEARS 4)

2022 ◽  
pp. 1-12
Author(s):  
Jingyi Li

Traditional financial data storage methods are prone to data leakage and narrow data coverage. Therefore, this paper proposes a dynamic and secure storage method of financial data based on cloud platform.In order to improve the ability of enterprise data management, the paper constructs a financial cloud computing platform, mining financial data by rough set theory, and analyzing the results of frequent pattern mining of financial data by fuzzy attribute characteristics.According to the granularity theory, the financial data is classified and processed, and the CSA cloud risk model is established to realize the dynamic and secure storage of financial data.The experimental results show that. The maximum data storage delay of this method is no more than 4.1 s, the maximum data leakage risk coefficient is no more than 0.5, the number of data types can reach 30, and the data storage coverage is improved.


2022 ◽  
Vol 70 (3) ◽  
pp. 4485-4502
Author(s):  
Jin Wang ◽  
Chenchen Han ◽  
Xiaofeng Yu ◽  
Yongjun Ren ◽  
R. Simon Sherratt

2022 ◽  
pp. 239-260
Author(s):  
Aman Ahmad Ansari ◽  
Bharavi Mishra ◽  
Poonam Gera

The e-healthcare system maintains sensitive and private information about patients. In any e-healthcare system, exchanging health information is often required, making privacy and security a primary concern for e-healthcare systems. Another major issue is that existing e-healthcare systems use centralized servers. These centralized servers require high infrastructure and maintenance costs for day-to-day services. Along with that, server failure may affect the working of e-healthcare systems drastically and may create life-threatening situations for patients. Blockchain technology is a very useful way to provide decentralized, secure storage for healthcare information. A blockchain is a time-stamped series of immutable records of data that is managed by a cluster of computers not owned by any single entity. These blocks create a chain of immutable, tamper-proof blocks in a ledger. This chapter will discuss the different aspects of blockchain and its application in different fields of the e-healthcare system.


2021 ◽  
Vol 14 (1) ◽  
pp. 1
Author(s):  
Dennis Przytarski ◽  
Christoph Stach ◽  
Clémentine Gritti ◽  
Bernhard Mitschang

When, in 2008, Satoshi Nakamoto envisioned the first distributed database management system that relied on cryptographically secured chain of blocks to store data in an immutable and tamper-resistant manner, his primary use case was the introduction of a digital currency. Owing to this use case, the blockchain system was geared towards efficient storage of data, whereas the processing of complex queries, such as provenance analyses of data history, is out of focus. The increasing use of Internet of Things technologies and the resulting digitization in many domains, however, have led to a plethora of novel use cases for a secure digital ledger. For instance, in the healthcare sector, blockchain systems are used for the secure storage and sharing of electronic health records, while the food industry applies such systems to enable a reliable food-chain traceability, e.g., to prove compliance with cold chains. In these application domains, however, querying the current state is not sufficient—comprehensive history queries are required instead. Due to these altered usage modes involving more complex query types, it is questionable whether today’s blockchain systems are prepared for this type of usage and whether such queries can be processed efficiently by them. In our paper, we therefore investigate novel use cases for blockchain systems and elicit their requirements towards a data store in terms of query capabilities. We reflect the state of the art in terms of query support in blockchain systems and assess whether it is capable of meeting the requirements of such more sophisticated use cases. As a result, we identify future research challenges with regard to query processing in blockchain systems.


2021 ◽  
Author(s):  
Valentina Lichtner ◽  
Mirela Prgomet ◽  
Peter Gates ◽  
Bryony Dean Franklin ◽  
Johanna I Westbrook

Evidence is limited of automated dispensing cabinets (ADCs) impact on effectiveness and efficiency of controlled drugs’ (CDs) governance processes. We carried out a mixed-methods study of an ADC in an intensive care unit. We found ADC improved effectiveness and efficiency of governance of CDs through secure storage, alerts and automated recording of transactions. Limitations were associated with ADC design and ‘fit’ between ADC and some types of CDs.


Sensors ◽  
2021 ◽  
Vol 21 (24) ◽  
pp. 8347
Author(s):  
Thanikodi Manoj Kumar ◽  
Kavitha Rani Balmuri ◽  
Adam Marchewka ◽  
Parameshachari Bidare Divakarachari ◽  
Srinivas Konda

Nowadays, a large number of digital data are transmitted worldwide using wireless communications. Therefore, data security is a significant task in communication to prevent cybercrimes and avoid information loss. The Advanced Encryption Standard (AES) is a highly efficient secure mechanism that outperforms other symmetric key cryptographic algorithms using message secrecy. However, AES is efficient in terms of software and hardware implementation, and numerous modifications are done in the conventional AES architecture to improve the performance. This research article proposes a significant modification to the AES architecture’s key expansion section to increase the speed of producing subkeys. The fork–join model of key expansion (FJMKE) architecture is developed to improve the speed of the subkey generation process, whereas the hardware resources of AES are minimized by avoiding the frequent computation of secret keys. The AES-FJMKE architecture generates all of the required subkeys in less than half the time required by the conventional architecture. The proposed AES-FJMKE architecture is designed and simulated using the Xilinx ISE 5.1 software. The Field Programmable Gate Arrays (FPGAs) behaviour of the AES-FJMKE architecture is analysed by means of performance count for hardware resources, delay, and operating frequency. The existing AES architectures such as typical AES, AES-PNSG, AES-AT, AES-BE, ISAES, AES-RS, and AES-MPPRM are used to evaluate the efficiency of AES-FJMKE. The AES-FJMKE implemented using Spartan 6 FPGA used fewer slices (i.e., 76) than the AES-RS.


Author(s):  
Viktor P. Kochyn ◽  
Anatolii V. Zherelo

The article discusses the main approaches to the design and development of an automated information system for a secure cloud repository of paperworks of students and employees of educational and research organisations (abstracts, essays, term papers and theses, master’s theses, deposited articles), providing secure storage and secure mobile access to stored data. The research and development of architectural solutions to ensure reliable and secure data storage using cloud technologies are described. The main problems of designing a secure repository and ways to solve them are considered. The cloud repository of written works is built on the basis of the Ceph distributed file system, which uses the NextCloud system and the virtual computing resources of the virtual network infrastructure of the Belarusian State University as a platform for building a cloud interface.


2021 ◽  
pp. 103597
Author(s):  
Dun Li ◽  
Dezhi Han ◽  
Zibin Zheng ◽  
Tien-Hsiung Weng ◽  
Hongzhi Li ◽  
...  

2021 ◽  
Vol 2091 (1) ◽  
pp. 012062
Author(s):  
I M Kosmacheva ◽  
N V Davidyuk ◽  
SV Belov ◽  
Yu Kuchin ◽  
I Yu Kvyatkovskaya ◽  
...  

Abstract According to modern statistics and analytical reviews, targeted computer attacks (cyber attacks) are becoming more and more numerous. Attackers began to use non-standard schemes for implementing attacks, using employees of organizations as intermediaries, which reduces the efficiency of detecting violations. At the same time, the targets of attackers are increasingly critical information infrastructure (CII) objects. The number of cyberattacks on the critical infrastructure of the Russian Federation increased by 150%. Successful attacks on CII are associated with a lack of software updates for industrial equipment, personnel errors, incorrect configuration of protection tools and can potentially lead to disasters. Prediction of computer attacks on CII based on a comprehensive analysis of the characteristics of incidents and system users can significantly increase the efficiency of incident detection, since it is obvious that technical and anthropogenic characteristics in this case should be taken into account together. It is difficult to classify computer incidents due to the volume and heterogeneity of the data about them. The paper proposes approaches that provide for the initial systematization of system log data and user characteristics, an assessment of their informativeness. This will reduce the complexity of further data processing and increase the performance of the computer attack forecasting system by excluding some uninformative data from a single secure storage. The second important task is to create test systems based on available platforms for analyzing and detecting computer incidents in order to train future information security specialists in big data analysis technologies.


2021 ◽  
Vol 5 (3) ◽  
pp. 103-111
Author(s):  
Petro Klimushin ◽  
Tetiana Solianyk ◽  
Tetiana Kolisnyk ◽  
Oleksandr Mozhaiv

The paper objective is to determine the basic schemes and their characteristics for ensuring the security of Internet of Things nodes using symmetric authentication cryptographic microcircuits. The main results that had been obtained by using method of structural and functional design represent potentially possible options for using symmetric authentication cryptomicrocircuits to ensure the protection of Internet of Things nodes. The analysis of the presented schemes’ functioning made it possible to form the following conclusions. The host-side private key storage authentication scheme provides a fast symmetric authentication process, but requires secure storage of the private key on the host side. The simplest authentication scheme without storing a secret key on the host side, which does not imply the use of a cryptographic chip on the host side, provides a fast symmetric authentication process, but has a relatively low cryptographic strength, since the interaction in the system is performed without a random component in cryptographic transformations, which assumes constant the nature of requests in the system, and, consequently, the possibility of cryptanalysis of messages. To increase the cryptographic strength of such a scheme, it is advisable to introduce into the interaction system a random component in cryptographic transformations and use additional hashing procedures with an intermediate key, which leads to the complication of the scheme due to double hashing, but significantly increases the level of information security of IoT nodes. Downloading software in the system is implemented using secret encryption and authentication keys, which are permanently stored in the secure non-volatile memory of cryptographic chips of IoT nodes. In this case, session keys for encrypting the firmware code or decrypting it are generated on the client and host side, respectively. This approach allows creating unique downloads of the original firmware code (application) by preventing cryptanalysts from obtaining its images and algorithms. The peculiarity of the scheme of exchange of symmetric session encryption keys of messages are: use of a secret key stored on the side of the host and the client; the determination of the session key is performed as a result of hashing a random number with a secret key, that is, the exchange of the session key is performed in an encrypted secure form.


Sign in / Sign up

Export Citation Format

Share Document