[PDF][PDF] Forgetting personal data and revoking consent under the GDPR: Challenges and proposed solutions

E Politou, E Alepis, C Patsakis - Journal of cybersecurity, 2018 - academic.oup.com
Abstract Upon the General Data Protection Regulation's (GDPR) application on 25 May
2018 across the European Union, new legal requirements for the protection of personal data …

[HTML][HTML] Security and privacy issues of physical objects in the IoT: Challenges and opportunities

X Yao, F Farha, R Li, I Psychoula, L Chen… - Digital Communications …, 2021 - Elsevier
Abstract In the Internet of Things (IoT), security and privacy issues of physical objects are
crucial to the related applications. In order to clarify the complicated security and privacy …

An improved attribute‐based encryption technique towards the data security in cloud computing

S Namasudra - Concurrency and Computation: Practice and …, 2019 - Wiley Online Library
With the rapid development of the Internet, resource and knowledge sharing are two major
problems experienced due to the presence of many hackers and malicious users. In this …

A secure data self-destructing scheme in cloud computing

J Xiong, X Liu, Z Yao, J Ma, Q Li… - IEEE Transactions on …, 2014 - ieeexplore.ieee.org
With the rapid development of versatile cloud services, it becomes increasingly susceptible
to use cloud services to share data in a friend circle in the cloud computing environment …

A full lifecycle privacy protection scheme for sensitive data in cloud computing

J Xiong, F Li, J Ma, X Liu, Z Yao, PS Chen - Peer-to-peer Networking and …, 2015 - Springer
With the rapid development of versatile cloud services, it becomes increasingly susceptible
to expose users' sensitive data into the cloud computing environment. In this paper, we …

A privacy preserve big data analysis system for wearable wireless sensor network

C Ge, C Yin, Z Liu, L Fang, J Zhu, H Ling - Computers & Security, 2020 - Elsevier
Big data and artificial intelligence develop rapidly. Big data analysis has been applied in
many fields of smart healthcare. Once these data are leaked or modified during …

A study and analysis on symmetric cryptography

S Chandra, S Bhattacharyya, S Paira… - 2014 International …, 2014 - ieeexplore.ieee.org
Technology is advancing day-to-day. For a better and faster technology, information security
is a must. This requires data authentication at the execution levels. Cryptography is a useful …

The “right to be forgotten” in the GDPR: implementation challenges and potential solutions

E Politou, E Alepis, M Virvou, C Patsakis… - Privacy and Data …, 2022 - Springer
The GDPR, being a legal document, follows a technology-agnostic approach so as not to
bind the provisions of the law with current trends and state-of-the-art technologies in …

Advanced persistent threat defense system using self-destructive mechanism for cloud security

JV Chandra, N Challa… - 2016 IEEE International …, 2016 - ieeexplore.ieee.org
A Number of Dynamics such as on-demand and versatile cloud services, software
interoperability standards, high bandwidth dynamic communication technologies, broad …

EFFICIENT DATA STORAGE MODEL TO OVERCOME THE STORAGE PROBLEMS IN INDUSTRIES.

LA Varghese, S Bose - Dynamic Systems and Applications, 2021 - go.gale.com
Industries face a major problem of storing the enormous amount of data produced in their
day to day business. This paper focuses on solving this problem effectively by a novel …