-
81
Network Management System's Data Management Layer Based on Big Data Technology
Published 2015-11-01“…Data management layer is the core of data processing and management in network management system.The current situation and problems of network management system was introduced.To break the isolation between the professional network management system and promote data sharing,data domain should further be subdivided and the data model should be reconstructed,and technical framework of Hadoop+MPP was a better choice.The direction for the planning and design of the network management system was pointed out.Finally,the relation of data management layer platform and enterprise wide data sharing service platform was discussed.…”
Get full text
Article -
82
Accelerated algorithm in attribute-based encryption over cloud environment
Published 2019-11-01“…Cloud computing provides storage,computing and network services to tenants.Data security and data sharing and access control between tenants are indispensable functions.Attribute-based encryption (ABE) system is a one to many encryption system,which allows users to fine -grained access control on encrypted data according to users’ attributes.This encryption system is very suitable for multi-tenant data sharing overcloud computing environment.However,the existing attribute-based encryption schemes is inefficient,which cannot be applied to practical applications.Two types of ABE and their application scenarios were analyzed,and an acceleration algorithms scheme in attribute encryption cryptosystem was proposed.The experiment can illustrate that the proposed scheme can improve the efficiency of key generation algorithm,encryption algorithm and decryption algorithm.…”
Get full text
Article -
83
Research category and future development trend of data elements circulation and security
Published 2024-05-01“…Towards the trend of evolution from controlled data sharing in the information technology era to ubiquitous circulation of data elements in the data technology era, the difference between data sharing and data element circulation was analyzed, what kind of data could become a data element was explained, and six attributes that data must have to become a data element were put forward. …”
Get full text
Article -
84
The Path of Digital Government and University Asset Intelligence Value-Added Service Driven by Block Chain Technology
Published 2022-01-01“…Block chain technology played an important role in enterprise asset data resource data sharing, but there was less research on asset data sharing services applied to digital government and universities. …”
Get full text
Article -
85
Challenges of sharing individual participant data for secondary research on neglected tropical diseases: the experience of Drugs for Neglected Diseases initiative and a call for ac...
Published 2024-12-01“…Introduction The Drugs for Neglected Diseases initiative (DNDi) is committed to maximising the scientific value of the individual participant data (IPD) it has collected during its 20 years of activity and the IPD it will collect in the future, while safeguarding research participants’ privacy and their right to know how their data will be processed.Objective The objective of this article is to share what DNDi has learnt while working on its commitment to data sharing. It also aims to advance the debate about best practice in the research community to avoid ‘IPD sharing paralysis’, with a focus on multistakeholder projects involving patients and researchers based in countries with various levels of data privacy regulations and measures.Results The article describes a practical case study outlining the ethical, legal and technical challenges encountered by DNDi in the context of IPD data sharing. …”
Get full text
Article -
86
Adaptive resource optimization mechanism for blockchain sharding in digital twin edge network
Published 2023-03-01“…To address the security and privacy issues for data sharing in digital twin edge networks, a new distributed and secure data sharing mechanism was developed by leveraging blockchain sharding.Considering dynamic and time varying features in digital twin edge networks and mapping errors of physic networks, an adaptive resource allocation model was formulated which jointly optimized cluster head selection, local base station (BS) consensus access selection, spectrum and computation consensus resources allocation, in order to maximize transactional throughput for the blockchain sharding.Moreover, a digital twin edge networks empowered two-layered proximal policy optimization (PPO) algorithm was designed to obtain the optimal solutions.Numerical results illustrate that the proposed algorithm can effectively improve the transactional throughput for the blockchain sharding.Meanwhile, it can well adapt to the mapping errors.…”
Get full text
Article -
87
A scoping review of the landscape of health-related open datasets in Latin America.
Published 2023-10-01“…We provide recommendations for enhancing data sharing in the region.…”
Get full text
Article -
88
Medical researchers' perception of sharing of metadata from case report forms
Published 2025-01-01“…Results Only 0.3% (5/1842) of data sharing commitments in DRKS included a plan to share blank CRFs. …”
Get full text
Article -
89
Blockchain-based and verifiable multidimensional data aggregation and sharing scheme for smart grid
Published 2024-01-01“…Aiming at the problem that how to support lightweight multi-dimensional data aggregation, achieve double-end integrity verification of multi-dimensional data in the overall process of the system, and deal with the centralization of cloud servers, a blockchain-based and verifiable multidimensional data aggregation and sharing scheme for smart grid was proposed.Firstly, in order to meet the demand for fine-grained analysis of power data in smart grid, privacy-preserving multidimensional data aggregation was achieved by using masked values and Horner’s rule.On this basis, for the data integrity verification problem of the existing data aggregation scheme in the sharing of cloud storage data with the third party, a new signature algorithm was designed by borrowing the RSA-based multiplicative homomorphic commitment scheme and homomorphic hash function homomorphism, which enabled the cloud server to verify the integrity of aggregated data and be used for integrity verification in the data sharing phase, i.e., it achieved double-end verifiability of cloud storage data and was resistant to internal attacks.Meanwhile, an aggregated data sharing architecture based on federated chain multichain was proposed to effectively avoid centralisation problems such as single-machine processing bottleneck and vulnerability to attacks.The theoretical analysis proves the security of the scheme.Performance experiments show that the proposed scheme has lower computation and communication costs compared with existing schemes.…”
Get full text
Article -
90
Optimization Model of Traffic Sensor Layout considering Traffic Big Data
Published 2020-01-01“…Considering the impact of traffic big data, a set of impact factors for traffic sensor layout is established, including system cost, multisource data sharing, data demand, sensor failures, road infrastructure, and sensor type. …”
Get full text
Article -
91
Creating a Health Data Marketplace for the Digital Health Era
Published 2024-09-01“…With the advent of the General Data Protection Regulation (GDPR) of the EU and the development of technologies like blockchain and distributed ledger technologies (DLT), it is now possible to create a new paradigm with a shared economic model where financial Incentivization will be the main driver for data sharing. This can be achieved by setting up a digital health data marketplace (DHDM). …”
Get full text
Article -
92
Blockchain-based cross-data center anonymous and verifiable identity authentication scheme
Published 2024-04-01“…With the progression of big data and cloud computing technologies, there has been an escalating trend in cross-institutional data sharing and interaction within the financial sector. …”
Get full text
Article -
93
La communication éthique d’une société consumériste d’information
Published 2012-02-01“…A new power relationship is being established, that of a society ever increasingly consuming medical information in which transparency, confidentiality, exchange and data sharing come face to face with resulting ethical and human issues.…”
Get full text
Article -
94
Opportunities for promoting open data in the Caribbean through biobanks
Published 2025-02-01“…Establishing a Caribbean biobank with equitable data-sharing principles can significantly enhance global genomic data sets and ensure that the benefits of precision medicine reach the Caribbean. …”
Get full text
Article -
95
Research on cloud storage systems supporting secure sharing
Published 2017-10-01“…A practical scheme for the cloud storage system was proposed to ensure security and efficiency during data sharing.The scheme which combine attribute-based encryption,proxy encryption with symmetric encryption,could integrate access control,efficient search with encryption well together.The scheme archived conjunctive-keyword non-field subset search by using bilinear mapping and polynomial equation.The scheme reduced the cost of decryption by outsourcing most of the decryption operations from the terminal to the cloud.At last,the performance was analyzed and an experiment was made for verification.…”
Get full text
Article -
96
Implementation of carceral medicaid suspension and enrollment programs: perspectives of carceral and medicaid leaders
Published 2025-01-01“…Discussion Findings highlight the need to update data sharing infrastructure, which will be critical to the implementation of the 1115 waivers, as carceral facilities will be subject to Medicaid billing and reporting requirements. …”
Get full text
Article -
97
Design and application of blockchain pattern for credit information industry
Published 2018-04-01“…Based on the current status of Chinese credit information system,expounding the problems arising from the traditional credit information system structure,a credit system structure based on blockchain technology and two data transaction pattern and the technical framework of the credit data trading platform was proposed,It has the characteristics of decentralization,safe and credible,collective maintenance,and untampering.And the process of data transaction were expounded.To explore the advantage of application of blockchain in the credit and information industry:promote credit data sharing,improve the quality of supervision of the credit and information industry,ensure the privacy of the information subject,effectively improve the dimension of credit information.…”
Get full text
Article -
98
CP-ABE based data access control for cloud storage
Published 2011-01-01“…To solve the safety issues in cloud storage services for network characteristics and data sharing characteristics,and based on the CP-ABE(cipertext policy-attribute based encryption) algorithm,a cipher text access control mechanism was proposed.According to access control and related architecture,the corresponding secure data structure algorithms were given.After this,the simulations and the performance analysis were given to evaluate our algorithm.Under the premise of untrusted service provider,the proposed mechanism can ensure the data security of the cloud storage system in an open environment,and can reduce right management complexity through property management.…”
Get full text
Article -
99
Swarm learning with weak supervision enables automatic breast cancer detection in magnetic resonance imaging
Published 2025-02-01“…However, the development of AI models is often hindered by manual annotation requirements and strict data-sharing regulations between institutions. Methods In this study, we present an integrated pipeline combining weakly supervised learning—reducing the need for detailed annotations—with local AI model training via swarm learning (SL), which circumvents centralized data sharing. …”
Get full text
Article -
100
Blockchain-Assisted Hierarchical Attribute-Based Encryption Scheme for Secure Information Sharing in Industrial Internet of Things
Published 2024-01-01“…In addition, we developed a blockchain-integrated data-sharing scheme that makes it possible for users to share data via the use of edge and cloud storage. …”
Get full text
Article