Explore chapters and articles related to this topic
Blockchain in Global Health
Published in Kuan-Ching Li, Xiaofeng Chen, Hai Jiang, Elisa Bertino, Essentials of Blockchain Technology, 2019
Chandana Unnithan, Alexander Houghton, Aranka Anema, Victoria Lemieux
The universal adoption of EHRs globally is limited by several concerns around data management. The electronic transmission of confidential patient data remains vulnerable to breaches without highly secure infrastructure in place, placing patient, payer and provider at risk of unintentional and malicious data breaches, including identity theft.12 Lack of trust between healthcare institutions limits data sharing between hospital and ambulatory care settings.13 The share of large-scale datasets may be limited by restrictions in institutional firewall settings or bandwidth, the latter of which is notable in rural or remote settings.14 Finally, data sharing is impeded by the lack of enforcement of interoperability standards, making the integration and interpretation of data from disparate systems difficult.15
Security in the IoT
Published in Sudip Misra, Subhadeep Sarkar, Subarna Chatterjee, Sensors, Cloud, and Fog: The Enabling Technologies for the Internet of Things, 2019
Sudip Misra, Subhadeep Sarkar, Subarna Chatterjee
Before we delve into the details of security in the IoT, it is important to understand the contextual significance and to figure out how IoT security is very different from conventional security in wireless networks or the cloud. The primary difference begins with the deployment of the network. Unlike other wireless networks, IoT networks are deployed on low power and lossy networks (LLNs), which are characterized by their limited memory and processing power, thereby mandating the use of lightweight protocols and discarding heavy in-network optimizations. Node impersonation is another major challenge in LLNs (i.e., if an attacker is able to connect using a fake identity, it is considered authentic, which should be prevented) [5]. In IoT devices, security issues are explored at different layers. Frequency hopping-based communication and public key cryptography are impossible at the perception layer, owing to the constrained behavior of the nodes. The network layer is vulnerable to man-in-the-middle and counterfeit attacks. Provision for data sharing creates a wide spectrum of security concerns due to privacy policies, access control, and lack of confidentiality of information. For example, Datagram Transport Layer Security is used in the network layer, IPv6 is used in the perception layer, Constrained Application Protocol (CoAP) is used in the application layer, and so on.
Ontology and data formats for the structured exchange of occupancy related building information
Published in Jan Karlshøj, Raimar Scherer, eWork and eBusiness in Architecture, Engineering and Construction, 2018
Data sharing in general has various benefits, such as, facilitating new research, increasing efficiency concerning time and effort, collaborative and interdisciplinary data processing, assessing data quality, and effectively examining the reliability of research results (Tenopir et al. 2011). Scientific research in recent years has become increasingly collaborative and interdisciplinary. Even though the importance of open access data is undeniable, there is still a lack of uniform standardized platforms for open data sharing and processing (Gault and Koers 2015). Efforts have been made to provide such platforms for sharing scientific data and related material, for example, in Scientific Data (Springer Nature 2018) by Nature Publishing Group, Open Data pilot (Elsevier 2018a) and Data in Brief (Elsevier 2018b) by Elsevier.
The emergence of cognitive digital twin: vision, challenges and opportunities
Published in International Journal of Production Research, 2022
Xiaochen Zheng, Jinzhi Lu, Dimitris Kiritsis
A CDT system requires integration of data from different stakeholders. The main concerns during data sharing are about data security and privacy and intellectual property (IP) protection. To deal with these concerns, reliable cybersecurity infrastructure and data encryption mechanisms are necessary. Boschert, Heinrich, and Rosen (2018) proposed two ways to control the degree of transparency of CDTs, i.e. using encapsulated models to guarantee IP protection and open models for realising integrated development processes. The recent advancement of Distributed Ledger Technologies (DLT), including blockchain, provides a decentralised solution for protecting data security and privacy during data sharing. DLT removes the dominant administrator and central database compared with traditional data sharing approaches which enables secure data sharing in a trustless environment. It has attracted increasing attention from both researchers and practitioners recently. Various DLT systems and platforms have been developed including private ledgers, permissioned ledgers and public ledgers etc. As an example, Sun et al. (2020) developed a IIoT data handling architecture using a public ledger and IOTA Tangle (Popov 2018; Chen et al. 2020), to ensure data privacy and to protect data ownership in a distributed platform. Considering the advantages of DLT, it will be a promising technology to accelerate the CDT vision and should be taken into consideration during future CDT development.
Sharing secured data on peer-to-peer applications using attribute-based encryption
Published in Journal of Information and Telecommunication, 2021
Nhan Tam Dang, Ha Manh Tran, Sinh Van Nguyen, Marcin Maleszka, Hai-Duong Le
Data-sharing systems can be categorized into two types: centralized data sharing and P2P distributed systems. Centralized data-sharing systems are limited by trust and authority. For example, a Facebook user posts an article on Facebook and only wants a group of users to be notified about the published article's presence. Therefore, Facebook relies on the request of the users and enforces the policy on the corresponding data. On the other hand, P2P file-sharing systems contain a process of sharing digital data from one end-user's computer connected to the other computers via the Internet without going through intermediary servers. Peers can use P2P file-sharing software, e.g. Gnutella or BitTorrent applications, for this process. A peer sends a query to other peers to get the data's location and download the data to obtain it.
Implementing the GEOSS water strategy: from observations to decisions
Published in International Journal of Digital Earth, 2023
Richard Lawford, Sushel Unninayar, George J. Huffman, Wolfgang Grabs, Angélica Gutiérrez, Chu Ishida-Watanabe, Toshio Koike
Developing appropriate policies and maintaining in-situ data networks that conform to international and global standards for data sharing are major challenges. The GEOSS Water Strategy’s recommendations related to in-situ data acquisition need to be addressed within a broad framework that considers national needs for data to support sustainable development targets and indicators, climate change accords, disaster risk reduction goals, resource development, industrial and domestic needs, and ecosystem requirements. More consistency in data policies is needed across national boundaries and across all EWVs to facilitate global assessments, research, and regional applications.