scispace - formally typeset
Search or ask a question

How to secure user data? 


Best insight from top research papers

Personal Data Management Systems (PDMSs) can secure user data by leveraging Trusted Execution Environments (TEEs) as a basis for security . This architecture allows for data processing extensiveness through the integration of user-defined functions, while still ensuring security. Additionally, a concrete scheme based on ring signature and smart contracts can be used to implement secure group user revocation and signature re-signing, without revealing any user identity . User-Centric Secure Data Sharing (UC-SDS) approaches aim to shift the focus back to the user, combining technologies and methodologies from secure data sharing, secure data outsourcing, and value-oriented design . Proxy Re-encryption algorithms can be used to securely share data with authorized users only once, preventing duplication and unauthorized sharing . Proof of retrievability schemes using blockchain technology can ensure the security and integrity of user information stored in the cloud .

Answers from top 5 papers

More filters
Papers (5)Insight
The paper proposes a proof of retrievability scheme using blockchain technology to secure user data by ensuring the integrity of the stored data.
The paper proposes a secure mechanism to share information by using a variant of Proxy Re-encryption algorithm. This allows the data owner to securely share data via a proxy server without the need to be available all the time.
The paper discusses the concept of User-Centric Secure Data Sharing (UC-SDS) and proposes combining technologies and methodologies from the fields of secure data sharing and secure data outsourcing to achieve a higher level of user-centricity in access control. However, the specific methods for securing user data are not mentioned in the paper.
The paper proposes a Personal Data Management System (PDMS) architecture that leverages Trusted Execution Environments (TEEs) to secure user data. It introduces security building blocks and guarantees an upper bound on data leakage.
The provided paper discusses a scheme based on ring signature and smart contracts to secure user data in group shared data scenarios. It ensures identity privacy, resistance against collusion attacks, and supports secure user revocation.

Related Questions

Why is user data so important to cyber criminals?4 answersUser data is important to cyber criminals because it can be used for various malicious activities. Cyber criminals can analyze user feedback and behavior to identify potential targets for cyber attacks. Personal data, such as banking and social media account information, can be hacked and used for financial gain or to cause harm to individuals. Additionally, personal data can be stolen and sold to enhance the market position of organizations or obtain intellectual property. Web traffic data, which includes information about web visitors' location, visited webpages, and searched keywords, can be monitored and evaluated to identify potential vulnerabilities and exploit them. Overall, user data provides valuable insights and opportunities for cyber criminals to carry out their illegal activities.
What are the most effective data security methods?4 answersEffective data security methods include analyzing data access events to generate user profiles and comparing new data access events to these profiles to determine if they correspond to historical patterns. Cryptology is also used to safeguard multimedia data, but traditional ciphers may not be suitable for multimedia applications. Hash algorithms can be used to compute hash values for messages, providing integrity and security. Data analysis and visualization are powerful tools for increasing visibility and preventing security breaches. Hardware-based security can be used to store data securely and transfer it to less-secure processors with greater security.
How to secure data at rest?5 answersTo secure data at rest, various techniques can be employed. One approach is to direct all data storage and retrieval messages through a security server, which encrypts and decrypts the data, generates encrypted index information, and digitally signs the re-encrypted data before transmitting it to a remote data store. Another method involves cloaking the data using user-specific cloaking sequences and mappings, applying a cloaking algorithm, and storing the cloaked data in persistent memory. During a later time period, the cloaked data can be re-cloaked using different hidden sequences and mappings. Additionally, data can be securely stored by using a data safe that performs data plane processing operations without exposing pilot keys outside the safe. These pilot keys are used to encrypt information before storing it in a storage system. Another approach is to encrypt and decrypt data using a cryptographic key, distribute key shards among devices, and store the encrypted data on a device that lacks the cryptographic key, ensuring its security. Finally, securing data in an industrial processing facility can be achieved by creating a private blockchain using OPC UA functionality and storing it in an OPC UA address space, with consensus among participant nodes determining the addition of new blocks to the public ledger.
Which security approach seems most popular to integrate user security in applications (cloud or otherwise)?5 answersThe most popular security approach to integrate user security in applications, whether in the cloud or otherwise, seems to be the use of Machine Learning. Machine learning approaches, such as supervised learning, unsupervised learning, semi-supervised learning, and reinforcement learning, have been explored extensively to tackle cloud security challenges. These approaches have been evaluated based on their characteristics, benefits, and shortcomings, and have shown promise in addressing potential security issues, threats, and attacks in cloud computing and distributed computing architectures. Employing technology like Machine Learning can help in maintaining the security of cloud data and mitigating potential threats.
What are the best ways to secure files and records?5 answersThe best ways to secure files and records include using encryption and access control mechanisms. Encryption ensures that the data is protected by converting it into an unreadable format that can only be decrypted with the appropriate key. Access control mechanisms, such as permissions and authentication, determine who can access the files and records, preventing unauthorized access. Additionally, implementing file system filtering modules can add an extra layer of security by adding assigned character strings to file names and checking for fit formats. It is also important to define and organize the storage of information between computer runs, using terms like file, record, and field. Another approach is to subject files to encryption and out-of-order processing, as well as byte reducing processing, to store corrupted character strings instead of complete file content, reducing the risk of leakage.
How can you ensure security of an information system?7 answers