• Title/Summary/Keyword: Data Sharing Policy

Search Result 264, Processing Time 0.021 seconds

Utilizing Block chain in the Internet of Things for an Effective Security Sharing Scheme

  • Sathish C;Yesubai Rubavathi, C
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.6
    • /
    • pp.1600-1619
    • /
    • 2023
  • Organizations and other institutions have recently started using cloud service providers to store and share information in light of the Internet of Things (IoT). The major issues with this storage are preventing unauthorized access and data theft from outside parties. The Block chain based Security Sharing scheme with Data Access Control (BSSDAC) was implemented to improve access control and secure data transaction operations. The goal of this research is to strengthen Data Access Control (DAC) and security in IoT applications. To improve the security of personal data, cypher text-Policy Attribute-Based Encryption (CP-ABE) can be developed. The Aquila Optimization Algorithm (AOA) generates keys in the CP-ABE. DAC based on a block chain can be created to maintain the owner's security. The block chain based CP-ABE was developed to maintain secures data storage to sharing. With block chain technology, the data owner is enhancing data security and access management. Finally, a block chain-based solution can be used to secure data and restrict who has access to it. Performance of the suggested method is evaluated after it has been implemented in MATLAB. To compare the proposed method with current practices, Rivest-Shamir-Adleman (RSA) and Elliptic Curve Cryptography (ECC) are both used.

Efficient Secret Sharing Data Management Scheme for Privacy Protection in Smart Grid Environment (스마트 그리드 환경에서 개인정보 보호를 위한 효율적인 비밀분산 데이터 관리 방안)

  • Lee, Sung-Yong;Yeo, Sang-Soo
    • Journal of Digital Convergence
    • /
    • v.11 no.12
    • /
    • pp.311-318
    • /
    • 2013
  • It is very important to design security policy and technical framework on sensitive private data in order to protect user privacy in smart grid environment. This paper introduces secret data sharing schemes proposed for privacy protection in smart grid, and presents technical problems of them. The proposed scheme in this paper, reduces the number of rounds in sharing process and also in restoration process, and can select how many databases would be used, so eventually it shows enhancements in terms of efficiency and security.

Enabling Fine-grained Access Control with Efficient Attribute Revocation and Policy Updating in Smart Grid

  • Li, Hongwei;Liu, Dongxiao;Alharbi, Khalid;Zhang, Shenmin;Lin, Xiaodong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.4
    • /
    • pp.1404-1423
    • /
    • 2015
  • In smart grid, electricity consumption data may be handed over to a third party for various purposes. While government regulations and industry compliance prevent utility companies from improper or illegal sharing of their customers' electricity consumption data, there are some scenarios where it can be very useful. For example, it allows the consumers' data to be shared among various energy resources so the energy resources are able to analyze the data and adjust their operation to the actual power demand. However, it is crucial to protect sensitive electricity consumption data during the sharing process. In this paper, we propose a fine-grained access control scheme (FAC) with efficient attribute revocation and policy updating in smart grid. Specifically, by introducing the concept of Third-party Auditor (TPA), the proposed FAC achieves efficient attribute revocation. Also, we design an efficient policy updating algorithm by outsourcing the computational task to a cloud server. Moreover, we give security analysis and conduct experiments to demonstrate that the FAC is both secure and efficient compared with existing ABE-based approaches.

The Effect of AI and Big Data on an Entry Firm: Game Theoretic Approach (인공지능과 빅데이터가 시장진입 기업에 미치는 영향관계 분석, 게임이론 적용을 중심으로)

  • Jeong, Jikhan
    • Journal of Digital Convergence
    • /
    • v.19 no.7
    • /
    • pp.95-111
    • /
    • 2021
  • Despite the innovation of AI and Big Data, theoretical research bout the effect of AI and Big Data on market competition is still in early stages; therefore, this paper analyzes the effect of AI, Big Data, and data sharing on an entry firm by using game theory. In detail, the firms' business environments are divided into internal and external ones. Then, AI algorithms are divided into algorithms for (1) customer marketing, (2) cost reduction without automation, and (3) cost reduction with automation. Big Data is also divided into external and internal data. this study shows that the sharing of external data does not affect the incumbent firm's algorithms for consumer marketing while lessening the entry firm's entry barrier. Improving the incumbent firm's algorithms for cost reduction (with and without automation) and external data can be an entry barrier for the entry firm. These findings can be helpful (1) to analyze the effect of AI, Big Data, and data sharing on market structure, market competition, and firm behaviors and (2) to design policy for AI and Big Data.

Analysis of Future Spectrum Sharing Ecosystem Based on Causal Map (인과지도에 기반한 미래 주파수공유 생태계 분석)

  • Song, Hee Seok;Kim, Taehan
    • Journal of Information Technology Applications and Management
    • /
    • v.20 no.4
    • /
    • pp.19-31
    • /
    • 2013
  • There is tremendous increasing demand on spectrum resource which is boosted by spread of cloud computing and M2M telecommunication as well as smart phone and tablet PC. Recently, spectrum sharing technology has drawn attention to the spectrum policy makers as a promising way to overcome limitation of scarce spectrum resource. To succeed in commercialization of spectrum sharing technology, it is necessary to prospect the future business ecosystem of spectrum sharing and develop appropriate policies and laws at the same time along with the advance of spectrum sharing technology. The purpose of this paper is to prospect future spectrum sharing ecosystem and analyze business ecosystem of spectrum sharing with casual loop map. With the causal map and system dynamics method, it is possible to analyze feedback loops which is not limited to linear thinking and build policies which optimize positive dynamics in business ecosystem of spectrum sharing.

A Survey of State-of-the-Art Multi-Authority Attribute Based Encryption Schemes in Cloud Environment

  • Reetu, Gupta;Priyesh, Kanungo;Nirmal, Dagdee
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.1
    • /
    • pp.145-164
    • /
    • 2023
  • Cloud computing offers a platform that is both adaptable and scalable, making it ideal for outsourcing data for sharing. Various organizations outsource their data on cloud storage servers for availing management and sharing services. When the organizations outsource the data, they lose direct control on the data. This raises the privacy and security concerns. Cryptographic encryption methods can secure the data from the intruders as well as cloud service providers. Data owners may also specify access control policies such that only the users, who satisfy the policies, can access the data. Attribute based access control techniques are more suitable for the cloud environment as they cover large number of users coming from various domains. Multi-authority attribute-based encryption (MA-ABE) technique is one of the propitious attribute based access control technique, which allows data owner to enforce access policies on encrypted data. The main aim of this paper is to comprehensively survey various state-of-the-art MA-ABE schemes to explore different features such as attribute and key management techniques, access policy structure and its expressiveness, revocation of access rights, policy updating techniques, privacy preservation techniques, fast decryption and computation outsourcing, proxy re-encryption etc. Moreover, the paper presents feature-wise comparison of all the pertinent schemes in the field. Finally, some research challenges and directions are summarized that need to be addressed in near future.

The Influence of Quality and Satisfaction on the Quality Data Sharing of Mobile Telecommunication Service (이동통신서비스의 품질과 만족이 품질데이터 공유의도에 미치는 영향)

  • Shin, Sun-young;Suh, Chang-Kyo
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.18 no.4
    • /
    • pp.61-72
    • /
    • 2018
  • The purpose of this study is to analyze the impact of quality and satisfaction of mobile telecommunication service on the quality data sharing for mobile telecommunication service. Based on the theory of reasoned action(TRA), we proposed a research model that (1) service qualities significantly influence the service satisfaction and the attitude towards information sharing, (2) the attitude towards information sharing mediates between service satisfaction and the intention of information sharing, and (3) the intention of information sharing is affected by the service satisfaction and the attitude towards information sharing. Empirical analysis of mobile service users showed that the data quality of mobile communication services had a greater impact on satisfaction than voice quality. The service satisfaction had a positive effect on attitude towards information sharing and the intention of information sharing. Also, the attitude towards information sharing had a positive impact on the intention of information sharing. Based on this empirical study, we proposed a crowdsourcing as an alternative when quality data of mobile telecommunication service should be collected to improve telecommunication policy because by using collective intelligence of the crowdsourcing the government can gather more accurate and diverse data on mobile telecommunication service.

Knowledge Sharing Among Accounting Students: An Exploratory Study

  • BAGAIS, Omer Ali;ALJAAIDI, Khaled Salmen;AL-MOATAZ, Ehsan Saleh
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.7 no.11
    • /
    • pp.557-561
    • /
    • 2020
  • This paper explores the attitudes of accounting students toward knowledge sharing at Umm Al-Gura University for the academic year 2013-2014. The study explored knowledge sharing among 202 accounting students at Umm Al-Gura University in session during the 2013-2014 academic year. Primary data came from a 3-item questionnaire collected from students; secondary data were source from scholarly publication. Descriptive statistics was used. The findings of this study revealed that the students had a medium to high degree of positive attitude toward knowledge sharing. The students had a positive perception of the use of knowledge sharing in supporting their education. The findings are essential for several stakeholders, such as university policymakers, lecturers, and the students, to provide a deeper understanding of knowledge sharing at the university education level. The findings may encourage policymakers at the university and the classroom levels to organize activities that promote knowledge sharing such as seminars, symposiums, or knowledge sharing exercises during the classroom hours to raise the students' knowledge sharing behavior and enhance education. The results of this study should be useful to policy makers at the university level and the classroom level as there is a positive attitude in disseminating knowledge in the higher educational setting.

Secure Data Management based on Proxy Re-Encryption in Mobile Cloud Environment (모바일 클라우드 환경에서 안전한 프록시 재암호화 기반의 데이터 관리 방식)

  • Song, You-Jin;Do, Jeong-Min
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.4B
    • /
    • pp.288-299
    • /
    • 2012
  • To ensure data confidentiality and fine-grained access control in business environment, system model using KP-ABE(Key Policy-Attribute Based Encryption) and PRE(Proxy Re-Encryption) has been proposed recently. However, in previous study, data confidentiality has been effected by decryption right concentrated on cloud server. Also, Yu's work does not consider a access privilege management, so existing work become dangerous to collusion attack between malicious user and cloud server. To resolve this problem, we propose secure system model against collusion attack through dividing data file into header which is sent to privilege manager group and body which is sent to cloud server and prevent modification attack for proxy re-encryption key using d Secret Sharing, We construct protocol model in medical environment.