The results and details of the clinical studies and research must be securely stored to ensure reliability, accountability, and prevent malicious misuse. To accomplish this, a secure method for storing metadata and study results is crucial. Also, a mechanism to ensure accountability for both data owners and researchers is needed. In this way, data owners and the scientific community can rely on and verify results and methods presented by researchers, while researchers can check the validity of the analyzed data and have proof of authorship for their work. A modular framework is presented in this paper, which utilizes blockchain and cryptography to store study results and metadata, along with proof of accountability. The framework has been tested within a privacy-preserving distributed analytics infrastructure.
Download full-text PDF |
Source |
---|---|
http://dx.doi.org/10.3233/SHTI240643 | DOI Listing |
Sensors (Basel)
January 2025
Department of Computer Science and Engineering, Yanbu Industrial College, Royal Commission for Jubail and Yanbu, Yanbu Industrial City 41912, Saudi Arabia.
This paper provides the complete details of current challenges and solutions in the cybersecurity of cyber-physical systems (CPS) within the context of the IIoT and its integration with edge computing (IIoT-edge computing). We systematically collected and analyzed the relevant literature from the past five years, applying a rigorous methodology to identify key sources. Our study highlights the prevalent IIoT layer attacks, common intrusion methods, and critical threats facing IIoT-edge computing environments.
View Article and Find Full Text PDFSensors (Basel)
December 2024
College of Cryptography Engineering, Engineering University of PAP, Xi'an 710086, China.
With the rapid development of the Internet of Things (IoT), the scope of personal data sharing has significantly increased, enhancing convenience in daily life and optimizing resource management. However, this also poses challenges related to data privacy breaches and holdership threats. Typically, blockchain technology and cloud storage provide effective solutions.
View Article and Find Full Text PDFSci Rep
December 2024
Department of Computer Science, College of Education for Pure Sciences, University of Basrah, Basrah, Iraq.
Vehicular Ad-hoc Networks (VANETs) are growing into more desirable targets for malicious individuals due to the quick rise in the number of automated vehicles around the roadside. Secure data transfer is necessary for VANETs to preserve the integrity of the entire network. Federated learning (FL) is often suggested as a safe technique for exchanging data among VANETs, however, its capacity to protect private information is constrained.
View Article and Find Full Text PDFFront Big Data
December 2024
School of Business, Amrita Vishwa Vidyapeetham, Amritapuri, Kollam, Kerala, India.
Introduction: The rapid escalation of cyber threats necessitates innovative strategies to enhance cybersecurity and privacy measures. Artificial Intelligence (AI) has emerged as a promising tool poised to enhance the effectiveness of cybersecurity strategies by offering advanced capabilities for intrusion detection, malware classification, and privacy preservation. However, this work addresses the significant lack of a comprehensive synthesis of AI's use in cybersecurity and privacy across the vast literature, aiming to identify existing gaps and guide further progress.
View Article and Find Full Text PDFAdv Sci (Weinh)
December 2024
Institute of Mechanical Process Engineering and Mechanics (MVM), KIT, Strasse am Forum 8, 76131, Karlsruhe, Germany.
Decentralized consensus on the state of the Bitcoin blockchain is ensured by proof of work. It relies on digital one-way functions and is associated with an enormous environmental impact. This paper conceptualizes a physical one-way function that aims to transform a digital, electricity-consuming consensus mechanism into a physical process.
View Article and Find Full Text PDFEnter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!