SocialBlock: Technology that could improve data security in smart cities

This is where data management and access come in. Víctor García Font, researcher at the Universitat Oberta de Catalunya's (UOC) Internet InterdisciplinaryInstitute (IN3) says, "In smart cities it's easier for the bodies that promote data management rules to force providers to follow certain rules on how to process the data they gather."

In a study published in the Journal of Parallel and Distributed Computing, García Font puts forward a model for managing data security and control in this type of city, which would also be adapted to serve any social media network or communication platform.

The scientist has designed SocialBlock, an architecture for creating user-centric data management applications. With this new design, data storage and management are decentralized to reduce the current dependency on service providers and return control over data to the actors involved in communication.

Examples of this type of data management are citizen complaint forms and emergency notification systems. García Font said, "The key to decentralized management is that it's the generator of the data (very often the citizen) who controls them and can store them and decide who to disclose them to."

Furthermore, decentralization prevents the issues entailed in the current centralized data management model. Bringing it all together in a single server increases the risk of a collapse making the data unusable. It is also more vulnerable to theft of the data of millions of people by individuals or organized groups.

Blockchain for more secure communications

This architecture uses blockchain technology. "This technology is being used to set up many types of decentralized services. For example, for cryptocurrencies, blockchain is a kind of decentralized database where all currency transactions are stored," said García Font.

Thus, instead of currency transaction data being controlled by a handful of banks, as is the case now, with cryptocurrencies the entire community has control thanks to a common protocol and storage of information in a common data structure.

"The proposed application uses blockchain as a point where necessary information on each user can be found to access the rest of their information," said García Font. That is, in this technology users have a kind of profile where anyone wishing to send or receive information to or from that user can consult it. They then get cryptographic keys and the internet addresses where they can send the information securely and privately.

Flow of information between users

The new architecture envisages two types of communication: from one user to another and from one user to many. In one-to-one communication the protocol enables the user to safely send a communication directly to a single user.

"In a communication from one to many, a single user sends the same message to many different users but each message is encrypted with different keys for each user," explained García Font.

Website search

Recently updated

OneNote Password Recovery Key Crack + Activator Download 2020 OneNote Password Recovery Key Crack + Serial Number A password rҽcovҽry tool that is dҽsignҽd to rҽtriҽvҽ passphrasҽs for MS OnҽNotҽ filҽs by using a combination of various attacқs
P2 Commander Crack + Activator Download P2 Commander Crack With License Key 2020 A rҽliablҽ and ҽffҽctivҽ solution that hҽlps you to pҽrform comprҽhҽnsivҽ digital forҽnsic ҽxaminations and dҽlҽtҽd data rҽcovҽry
MailEnable Enterprise Premium Crack + Activator Download 2020 MailEnable Enterprise Premium Crack + Serial Number A powҽrful ҽmail sҽrvҽr that intҽgratҽs MAPI connҽctor for Outlooқ, mobilҽ connҽctivity, as wҽll as sharing and collaboration options

Software News

Jan 18
Ring's Neighbors app exposed users' home addresses and specific locations before the company became aware of the security issue.
Jan 15
Leaks of Microsoft's Windows 10X for single screen PCs reveal a simplified OS with an emphasis on simplicity.
Jan 15
Any building project requires the formulation of a series of initial plans prior to starting construction to serve as a basis and guide for the whole process. A similar procedure is followed in software development, with ...
Jan 13
I had a few emails from readers asking about the end of Adobe Flash and what they should do about it.
Jan 7
The COVID-19 pandemic has seen hardware developers clamoring to make 'open source' technology to support our frontline services. Their intentions have been honorable-an invitation to teams across the world to collaborate ...
Jan 1
Microsoft hackers tied to a massive intrusion of dozens of U.S. government agencies and private companies sneaked further into its systems than previously thought, although the intrusion doesn't appear to have caused any ...
Dec 22
Professional and college sports have been disrupted by the coronavirus pandemic. But sports played on virtual athletic fields and courts have thrived.

About us

Welcome to new crack resource! Our service can generate cracks, keygens and serials for your software to unlock it. CrackDownloadz provides a lot of popular cracks and keygens. No spyware and adware at all, just download new cracks, keygens and serials. If you have a software that needs a crack feel free to contact us.

Also you may contact us if you have software that needs to be removed from our website.