期刊文献+
共找到10篇文章
< 1 >
每页显示 20 50 100
A Deep Auto-encoder Based Security Mechanism for Protecting Sensitive Data Using AI Based Risk Assessment
1
作者 Lavanya M Mangayarkarasi S 《Journal of Harbin Institute of Technology(New Series)》 2025年第4期90-98,共9页
Big data has ushered in an era of unprecedented access to vast amounts of new,unstructured data,particularly in the realm of sensitive information.It presents unique opportunities for enhancing risk alerting systems,b... Big data has ushered in an era of unprecedented access to vast amounts of new,unstructured data,particularly in the realm of sensitive information.It presents unique opportunities for enhancing risk alerting systems,but also poses challenges in terms of extraction and analysis due to its diverse file formats.This paper proposes the utilization of a DAE-based(Deep Auto-encoders)model for projecting risk associated with financial data.The research delves into the development of an indicator assessing the degree to which organizations successfully avoid displaying bias in handling financial information.Simulation results demonstrate the superior performance of the DAE algorithm,showcasing fewer false positives,improved overall detection rates,and a noteworthy 9%reduction in failure jitter.The optimized DAE algorithm achieves an accuracy of 99%,surpassing existing methods,thereby presenting a robust solution for sensitive data risk projection. 展开更多
关键词 data mining sensitive data deep auto-encoders
在线阅读 下载PDF
Secure Sharing Scheme of Sensitive Data in the Precision Medicine System
2
作者 Deukhun Kim Heejin Kim Jin Kwak 《Computers, Materials & Continua》 SCIE EI 2020年第9期1527-1553,共27页
Numerous industries,especially the medical industry,are likely to exhibit significant developments in the future.Ever since the announcement of the precision medicine initiative by the United States in 2015,interest i... Numerous industries,especially the medical industry,are likely to exhibit significant developments in the future.Ever since the announcement of the precision medicine initiative by the United States in 2015,interest in the field has considerably increased.The techniques of precision medicine are employed to provide optimal treatment and medical services to patients,in addition to the prevention and management of diseases via the collection and analysis of big data related to their individual genetic characteristics,occupation,living environment,and dietary habits.As this involves the accumulation and utilization of sensitive information,such as patient history,DNA,and personal details,its implementation is difficult if the data are inaccurate,exposed,or forged,and there is also a concern for privacy,as massive amount of data are collected;hence,ensuring the security of information is essential.Therefore,it is necessary to develop methods of securely sharing sensitive data for the establishment of a precision medicine system.An authentication and data sharing scheme is presented in this study on the basis of an analysis of sensitive data.The proposed scheme securely shares sensitive data of each entity in the precision medicine system according to its architecture and data flow. 展开更多
关键词 Precision medicine sensitive data keyless signature infrastructure data sharing
在线阅读 下载PDF
Research on Classification and Desensitization Strategies of Sensitive Educational Data
3
作者 Chen Chen Caixia Liu 《Journal of Contemporary Educational Research》 2025年第4期141-146,共6页
In the era of digital intelligence,data is a key element in promoting social and economic development.Educational data,as a vital component of data,not only supports teaching and learning but also contains much sensit... In the era of digital intelligence,data is a key element in promoting social and economic development.Educational data,as a vital component of data,not only supports teaching and learning but also contains much sensitive information.How to effectively categorize and protect sensitive data has become an urgent issue in educational data security.This paper systematically researches and constructs a multi-dimensional classification framework for sensitive educational data,and discusses its security protection strategy from the aspects of identification and desensitization,aiming to provide new ideas for the security management of sensitive educational data and to help the construction of an educational data security ecosystem in the era of digital intelligence. 展开更多
关键词 data security sensitive data data classification data desensitization
在线阅读 下载PDF
Quantum-Inspired Sensitive Data Measurement and Secure Transmission in 5G-Enabled Healthcare Systems
4
作者 Xiaohong Lv Shalli Rani +2 位作者 Shanmuganathan Manimurugan Adam Slowik Yanhong Feng 《Tsinghua Science and Technology》 2025年第1期456-478,共23页
The exponential advancement witnessed in 5G communication and quantum computing has presented unparalleled prospects for safeguarding sensitive data within healthcare infrastructures.This study proposes a novel framew... The exponential advancement witnessed in 5G communication and quantum computing has presented unparalleled prospects for safeguarding sensitive data within healthcare infrastructures.This study proposes a novel framework for healthcare applications that integrates 5G communication,quantum computing,and sensitive data measurement to address the challenges of measuring and securely transmitting sensitive medical data.The framework includes a quantum-inspired method for quantifying data sensitivity based on quantum superposition and entanglement principles and a delegated quantum computing protocol for secure data transmission in 5G-enabled healthcare systems,ensuring user anonymity and data confidentiality.The framework is applied to innovative healthcare scenarios,such as secure 5G voice communication,data transmission,and short message services.Experimental results demonstrate the framework’s high accuracy in sensitive data measurement and enhanced security for data transmission in 5G healthcare systems,surpassing existing approaches. 展开更多
关键词 quantum computing 5G sensitive data measurement healthcare
原文传递
Secure Sensitive Data Sharing on a Big Data Platform 被引量:12
5
作者 Xinhua Dong Ruixuan Li +3 位作者 Heng He Wanwan Zhou Zhengyuan Xue Hao Wu 《Tsinghua Science and Technology》 SCIE EI CAS CSCD 2015年第1期72-80,共9页
Users store vast amounts of sensitive data on a big data platform. Sharing sensitive data will help enterprises reduce the cost of providing users with personalized services and provide value-added data services.Howev... Users store vast amounts of sensitive data on a big data platform. Sharing sensitive data will help enterprises reduce the cost of providing users with personalized services and provide value-added data services.However, secure data sharing is problematic. This paper proposes a framework for secure sensitive data sharing on a big data platform, including secure data delivery, storage, usage, and destruction on a semi-trusted big data sharing platform. We present a proxy re-encryption algorithm based on heterogeneous ciphertext transformation and a user process protection method based on a virtual machine monitor, which provides support for the realization of system functions. The framework protects the security of users' sensitive data effectively and shares these data safely. At the same time, data owners retain complete control of their own data in a sound environment for modern Internet information security. 展开更多
关键词 secure sharing sensitive data big data proxy re-encryption private space
原文传递
Pilot Study on the Intercalibration of a Categorisation System for FAlRer Digital Objects Related to Sensitive Data in the Life Sciences
6
作者 Christian Ohmann Romain David +11 位作者 Monica Cano Abadia Florence Bietrix Jan-Willem Boiten Steve Canham Maria Luisa Chiusano Walter Dastru Arnaud Laroquette Dario Longo Michaela Theresia Mayrhofer Maria Panagiotopoulou Audrey Richard Pablo Emilio Verde 《Data Intelligence》 EI 2022年第2期196-211,共16页
Sharing sensitive data is a specific challenge for research infrastructures in the field of life sciences.For that reason a toolbox has been developed,providing resources for researchers who wish to share and use sens... Sharing sensitive data is a specific challenge for research infrastructures in the field of life sciences.For that reason a toolbox has been developed,providing resources for researchers who wish to share and use sensitive data,to support the workflows for handling these kinds of digital objects.Common and community approved annotations are required to be compliant with FAIR principles(Findability,Accessibility,Interoperability,Reusability).The toolbox makes use of a tagging(categorisation)system,allowing consistent labelling and categorisation of digital objects,in terms relevant to data sharing tasks and activities.A pilot study was performed within the Horizon 2020 project EOSC-Life,in which 2 experts from 6 life sciences research infrastructures were recruited to independently assign tags to the same set of 10 to 25 resources related to sensitive data management and data sharing(in total 110).Summary statistics of agreement and observer variation per research infrastructure are provided.The pilot study has shown that experts were able to attribute tags but in most cases with a considerable observer variation between experts.In the context of CWFR(Canonical Workflow Frameworks for Research),this indicates the necessity for careful definition,evaluation and validation of parameters and processes related to workflow descriptions.The results from this pilot study were used to tackle this issue by revising the categorisation system and providing an updated version. 展开更多
关键词 sensitive data CWFR EOSC-Life Life sciences TOOLBOX Categorisation system Tagging FAIR
原文传递
Sensitive Information Security Based on Elliptic Curves
7
作者 Nadine Nibigira Vincent Havyarimana Zhu Xiao 《World Journal of Engineering and Technology》 2024年第2期274-285,共12页
The elliptic curve cryptography algorithm represents a major advancement in the field of computer security. This innovative algorithm uses elliptic curves to encrypt and secure data, providing an exceptional level of ... The elliptic curve cryptography algorithm represents a major advancement in the field of computer security. This innovative algorithm uses elliptic curves to encrypt and secure data, providing an exceptional level of security while optimizing the efficiency of computer resources. This study focuses on how elliptic curves cryptography helps to protect sensitive data. Text is encrypted using the elliptic curve technique because it provides great security with a smaller key on devices with limited resources, such as mobile phones. The elliptic curves cryptography of this study is better than using a 256-bit RSA key. To achieve equivalent protection by using the elliptic curves cryptography, several Python libraries such as cryptography, pycryptodome, pyQt5, secp256k1, etc. were used. These technologies are used to develop a software based on elliptic curves. If built, the software helps to encrypt and decrypt data such as a text messages and it offers the authentication for the communication. 展开更多
关键词 CRYPTOGRAPHY Elliptic Curves Digital Security data sensitive data IMPLEMENTATION
在线阅读 下载PDF
VRS-DB:preserve confidentiality of users'data using encryption approach 被引量:2
8
作者 J.S.Rauthan K.S.Vaisla 《Digital Communications and Networks》 SCIE CSCD 2021年第1期62-71,共10页
We focus on security and privacy problems within a cloud database framework,exploiting the DataBase as a Service(DBaaS).In this framework,an information proprietor drives out its information to a cloud database profes... We focus on security and privacy problems within a cloud database framework,exploiting the DataBase as a Service(DBaaS).In this framework,an information proprietor drives out its information to a cloud database professional company.The Data-Owner(DO)encrypts the delicate information before transmission at the cloud database professional company end to offer information security.Current encryption ideas,nonetheless,are just halfway homomorphic as all of them intend to enable an explicit kind of calculation,which is accomplished on scrambled information.These current plans can't be coordinated to solve genuine functional queries that include activities of various types.We propose and evaluate a Verifiable Reliable Secure-DataBase(VRS-DB)framework on shared tables along with many primary operations on scrambled information,which enables information interoperability,and permits an extensive possibility of Structured Query Language(SQL)queries to be prepared by the service provider on the encoded data.We show that our security and privacy idea is protected from two forms of threats and are fundamentally proficient. 展开更多
关键词 PRIVACY Security Cloud storage Encrypted query CRYPTOGRAPHY sensitive data
在线阅读 下载PDF
Content sensitivity based access control framework for Hadoop 被引量:2
9
作者 Ashwin Kumar T.K. Hong Liu +1 位作者 Johnson P. Thomas Xiaofeh Hou 《Digital Communications and Networks》 SCIE 2017年第4期213-225,共13页
Big data technologies have seen tremendous growth in recent years. They are widely used in both industry and academia. In spite of such exponential growth, these technologies lack adequate measures to protect data fro... Big data technologies have seen tremendous growth in recent years. They are widely used in both industry and academia. In spite of such exponential growth, these technologies lack adequate measures to protect data from misnse/abuse. Corporations that collect data from multiple sources are at risk of liabilities due to the exposure of sensitive information. In the current implementation of Hadoop, only file-level access control is feasible. Providing users with the ability to access data based on the attlibutes in a dataset or the user's role is complicated because of the sheer volume and multiple formats (structured, unstructured and semi-structured) of data. In this paper, we propose an access control framework, which enforces access control policies dynamically based on the sensitivity of the data. This framework enforces access control policies by harnessing the data context, usage patterns and informat/on sensitivity. Information sensitivity changes over time with the addition and removal of datasets, which can lead to modifications in access control decisions. The proposed framework accommodates these changes. The proposed framework is automated to a large extent as the data itself determines the sensitivity with minimal user intervention. Our experimental results show that the proposed framework is capable of enforcing access control policies on non-multimedia datasets with minimal overhead. 展开更多
关键词 Access control data driven information sensitivity PRIVACY Information value
在线阅读 下载PDF
6T SRAM cell analysis for DRV and read stability
10
作者 Ruchi S.Dasgupta 《Journal of Semiconductors》 EI CAS CSCD 2017年第2期73-79,共7页
The present paper analyzes the hold and read stability with temperature and aspect ratio variations. To reduce the power dissipation, one of the effective techniques is the supply voltage reduction. At this reduced su... The present paper analyzes the hold and read stability with temperature and aspect ratio variations. To reduce the power dissipation, one of the effective techniques is the supply voltage reduction. At this reduced supply voltage the data must be stable. So, the minimum voltage should be discovered which can also retain the data. This voltage is the data retention voltage(DRV). The DRV for 6T SRAM cell is estimated and analyzed in this paper.The sensitivity analysis is performed for the DRV variation with the variation in the temperature and aspect ratio of the pull up and pull down transistors. Cadence Virtuoso is used for DRV analysis using 45 nm GPDK technology files. After this, the read stability analysis of 6T SRAM cell in terms of SRRV(supply read retention voltage) and WRRV(wordline read retention voltage) is carried out. Read stability in terms of RSNM can be discovered by accessing the internal storage nodes. But in the case of dense SRAM arrays instead of using internal storage nodes,the stability can be discovered by using direct bit line measurements with the help of SRRV and WRRV. SRRV is used to find the minimum supply voltage for which data can be retained during a read operation. Similarly, WRRV is used to find the boosted value of wordline voltage, for which data can be retained during read operation. The SRRV and WRRV values are then analyzed for different Cell Ratios. The results of SRRV and WRRV are then compared with the reported data for the validation of the accuracy of the results. 展开更多
关键词 DRV SRRV WRRV data retention leakage reduction low power SRAM sensitivity analysis
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部