Your browser doesn't support javascript.
Show: 20 | 50 | 100
Results 1 - 8 de 8
Filter
1.
Security and Communication Networks ; 2023, 2023.
Article in English | Scopus | ID: covidwho-20243671

ABSTRACT

Electronic health records (EHRs) and medical data are classified as personal data in every privacy law, meaning that any related service that includes processing such data must come with full security, confidentiality, privacy, and accountability. Solutions for health data management, as in storing it, sharing and processing it, are emerging quickly and were significantly boosted by the COVID-19 pandemic that created a need to move things online. EHRs make a crucial part of digital identity data, and the same digital identity trends - as in self-sovereign identity powered by decentralized ledger technologies like blockchain, are being researched or implemented in contexts managing digital interactions between health facilities, patients, and health professionals. In this paper, we propose a blockchain-based solution enabling secure exchange of EHRs between different parties powered by a self-sovereign identity (SSI) wallet and decentralized identifiers. We also make use of a consortium IPFS network for off-chain storage and attribute-based encryption (ABE) to ensure data confidentiality and integrity. Through our solution, we grant users full control over their medical data and enable them to securely share it in total confidentiality over secure communication channels between user wallets using encryption. We also use DIDs for better user privacy and limit any possible correlations or identification by using pairwise DIDs. Overall, combining this set of technologies guarantees secure exchange of EHRs, secure storage, and management along with by-design features inherited from the technological stack. © 2023 Marie Tcholakian et al.

2.
3rd International Conference on Artificial Intelligence and Smart Energy, ICAIS 2023 ; : 398-403, 2023.
Article in English | Scopus | ID: covidwho-2300705

ABSTRACT

In the recent trends, block chain technology plays a vital role due to its secured methodology. Since many parts of the world severely affected by COVID pandemic situation, people used to perform more of digital transactions day by day. To provide more security for all online transactions, Block chain Technology is one of the solutions that many countries have started to utilize. Every block in a block chain should be validated and verified by the secured hash algorithms and digital signatures. Since Hacking is difficult in Block Chain Technology, due to its secure hash process, many people started using it for various applications. This article discusses about the working of Digital Signatures especially about Elliptic Curve Digital Signature Algorithm - ECDSA. Digital signatures are signatures done digitally for the purpose of security. ECDSA works on the mechanism of Elliptic Curve and Cryptography algorithms of Elliptic curve. The proposed research work has selected the private key as a random point, which is of type integer ranging between 1 and n-1 in Elliptic curve to sign documents. Then Public key is calculated by multiplying a point from elliptic curve with the Private key. Using this Public key, our digital signature is verified. This is much secured because no one can crack/hack private key. This process is used to verify digital transactions in the block chain technology. Our study helps researcher in block chain technologies to proceed ahead. © 2023 IEEE.

3.
37th International Conference on Information Networking, ICOIN 2023 ; 2023-January:230-235, 2023.
Article in English | Scopus | ID: covidwho-2274944

ABSTRACT

Owing to the spread of COVID-19, the digitalization of various services is rapidly being promoted. In particular, online services such as obtaining a digital certificate (e.g., digital signature) from an authority are becoming increasingly important. Therefore, systems that can autonomously generate digital signatures are urgently required. However, the autonomous generation of signatures is difficult because the secret key for signatures must be strictly managed. Moreover, a decentralized autonomous systems should be publicly verifiable. Thus, schemes that preclude strict control of the secret key are desirable. In this study, we propose a new decentralized scheme that autonomously generates a digital signature without a secret key, using blockchain-based smart contracts. The fundamental concept behind our scheme is to eliminate secret keys by leveraging the closed nature of the processing operations of smart contracts within the blockchain;thus, the process of generating signatures and their output values satisfies the condition of immutability. Finally, we perform a security evaluation and feasibility study of our proposed scheme and show that it works securely on the Ethereum blockchain. © 2023 IEEE.

4.
Internet of Things ; : 263-284, 2023.
Article in English | Scopus | ID: covidwho-2173638

ABSTRACT

The Internet of Things paradigm envisions a world where every physical object is equipped with sensing/actuation capabilities and computing power and acquires its own digital identity. These objects are referred to as "smart” and have the goal of collecting and processing information about the environment surrounding them. One of the fields of interest in IoT applications concerns the intelligent management of activities in indoor environments, even if affected by unusual restrictions due to special conditions, such as those posed by the Covid-19 pandemic. This study focuses on the development of an IoT application based on the COGITO platform for the intelligent management of meeting rooms. By processing data collected from a set of IoT devices, cameras, and cognitive microphones, the developed prototype is able to autonomously monitor and make decisions about aspects that continuously affect environmental comfort, event management, and assessment of compliance with anti-contagious regulations throughout the time the room is occupied. After a brief review of the state of the art, the chapter describes the developed application. Furthermore, it highlights the features that make meeting room environments more comfortable for users and effective in managing events such as meetings and lectures. © 2023, The Author(s), under exclusive license to Springer Nature Switzerland AG.

5.
14th International Conference on Electronics, Computers and Artificial Intelligence, ECAI 2022 ; 2022.
Article in English | Scopus | ID: covidwho-2018698

ABSTRACT

Digital transformation of public or private services, although it brings many improvements for our societies, it also raises security issues, mainly when focusing on the migration of physical signed documents in the digital environment. Digital signatures have proven to be reliable, thus they have seen a higher adoption in the last few years, especially in the context of the Covid-19 pandemic. Yet, a disadvantage is that digital signatures are volatile, being valid only for a maximum of a few years, depending on the validity of the asymmetric private key used to create that digital signature. Thus, validating a signed document after a few years could prove to be troublesome. In order to solve this problem, legislative and standardization efforts have been made and the legal and technical frameworks for long-term preservation services have been issued. In this paper we focus on the presentation of our implementation of a long-term preservation service for digital signatures, that is part of an entire long-term preservation system composed of multiple services, as mentioned in the paper. Our implementation is compliant with ETSI standards and uses the capabilities of current PKI infrastructures, while also adding in the resilience and trust of the blockchain. © 2022 IEEE.

6.
13th International Multi-Conference on Complexity, Informatics and Cybernetics, IMCIC 2022 ; 2:92-97, 2022.
Article in English | Scopus | ID: covidwho-1836709

ABSTRACT

The COVID 19 pandemic has fuelled the acceleration of the use of remote services as, for example, video conferences or digital identity verification solutions. Due to videoconferences or social medias, attackers have access to rich biometric sources and therefore make it possible to carry out high quality attacks such as videos of deepfakes, or morphing, against face recognition system. These kind of video attacks allow the attacker to fool face recognition even when these systems are secured by challenge-based liveness detection by presenting them. In order to prevent against these kind of attacks, adding an artefact detection to these systems could be a good solution. However, we will see in this paper that the development of remote digital identity verification tools on mobile application or on a computer (through a web app) opens the path to video injection attacks which bypass all of these security systems, namely a face recognition system secured with both challenge-based liveness detection and artefact detection. © by the International Institute of Informatics and Systemics.

7.
6th Latin American Conference on Learning Technologies, LACLO 2021 ; : 364-367, 2021.
Article in English | Scopus | ID: covidwho-1784520

ABSTRACT

The great technological convergence, which has emerged in recent years due to the appropriation of the globalized world and the emergence of the Covid-19 pandemic, leads us to formulate various approaches and questions, in relation to the digital identity of the users on the internet and on how to forge a global and secure digital citizenship. New media based on digital technologies such as social media, are generating a daily activity both as means of communication, interaction, and especially today as educational environments, this is leading to the formation of a digital society. This global phenomenon responds to a research study raised in university-level students from the city of Arequipa, this had as a pilot institution for the research process the Catholic University of Santa Mariá. Under the survey proposal, the implications related to social interaction in social media were determined;based on these results, some proposals were made to build safe environments for interaction in this time of pandemic and for subsequent years. It was concluded that it is essential to be able to generate and disseminate protocols and social norms to students for digital environments and social media, to establish safe environments for interaction and navigation. © 2021 IEEE.

8.
4th InternationalWorkshop on Emerging Technologies for Authorization and Authentication, ETAA 2021 co-located with 26th European Symposium on Research in Computer Security, ESORICS 2021 ; 13136 LNCS:68-76, 2021.
Article in English | Scopus | ID: covidwho-1703708

ABSTRACT

In developing regions a substantial number of users rely on legacy and ultra-low-cost mobile devices. Unfortunately, many of these devices are not equipped to run the standard authentication or identity apps that are available for smartphones. Increasingly, apps that display Quick Response (QR) codes are being used to communicate personal credentials (e.g., Covid-19 vaccination certificates). This paper describes a novel interface for QR code credentials that is compatible with legacy mobile devices. Our solution, which we have released under open source licensing, allows Web Application Enabled legacy mobile devices to load and display standard QR codes. This technique makes modern identity platforms available to previously excluded and economically disadvantaged populations. © 2021, Springer Nature Switzerland AG.

SELECTION OF CITATIONS
SEARCH DETAIL