Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Article Types

Countries / Regions

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Search Results (515)

Search Parameters:
Keywords = breaches data

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
27 pages, 1684 KB  
Systematic Review
Exploring the Impact of Information and Communication Technology on Educational Administration: A Systematic Scoping Review
by Ting Liu, Yiming Taclis Luo, Patrick Cheong-Iao Pang and Ho Yin Kan
Educ. Sci. 2025, 15(9), 1114; https://doi.org/10.3390/educsci15091114 - 27 Aug 2025
Abstract
In the era of educational digital transformation, integrating information and communication technology (ICT) into school administration aligns with the goals of promoting personalized learning, equity, and teaching quality. This study examines how ICT reshapes management practices, addresses challenges, and achieves educational objectives. To [...] Read more.
In the era of educational digital transformation, integrating information and communication technology (ICT) into school administration aligns with the goals of promoting personalized learning, equity, and teaching quality. This study examines how ICT reshapes management practices, addresses challenges, and achieves educational objectives. To explore ICT’s impact on school administration (2009–2024), we conducted a systematic scoping review of four databases (Web of Science, Scopus, ScienceDirect, and IEEE Xplore) following the PRISMA-ScR guidelines. Retrieved studies were screened, analyzed, and synthesized to identify key trends and challenges. The results show that ICT significantly improves administrative efficiency. Automated systems streamline routine tasks, allowing administrators to allocate more time to strategic planning. It enables data-driven decision-making. By analyzing large datasets, ICT helps identify trends in student performance and resource utilization, facilitating accurate forecasting and better resource allocation. Moreover, ICT strengthens stakeholder communication. Online platforms enable instant interaction among teachers, students, and parents, increasing the transparency and responsiveness of school administration. However, there are challenges. Data privacy concerns can erode trust, as student and staff data collection and use may lead to breaches. Infrastructure deficiencies, such as unreliable internet and outdated equipment, impede implementation. The digital divide exacerbates inequality, with under-resourced schools struggling to utilize ICT fully. ICT is vital in educational administration. Its integration requires a strategic approach. This study offers insights for optimizing educational management via ICT and highlights the need for equitable technological advancement to create an inclusive, high-quality educational system. Full article
(This article belongs to the Special Issue ICTs in Managing Education Environments)
Show Figures

Figure 1

35 pages, 1263 KB  
Review
Blockchain for Security in Digital Twins
by Rahanatu Suleiman, Akshita Maradapu Vera Venkata Sai, Wei Yu and Chenyu Wang
Future Internet 2025, 17(9), 385; https://doi.org/10.3390/fi17090385 - 27 Aug 2025
Abstract
Digital Twins (DTs) have become essential tools for improving efficiency, security, and decision-making across various industries. DTs enable deeper insight and more informed decision-making through the creation of virtual replicas of physical entities. However, they face privacy and security risks due to their [...] Read more.
Digital Twins (DTs) have become essential tools for improving efficiency, security, and decision-making across various industries. DTs enable deeper insight and more informed decision-making through the creation of virtual replicas of physical entities. However, they face privacy and security risks due to their real-time connectivity, making them vulnerable to cyber attacks. These attacks can lead to data breaches, disrupt operations, and cause communication delays, undermining system reliability. To address these risks, integrating advanced security frameworks such as blockchain technology offers a promising solution. Blockchains’ decentralized, tamper-resistant architecture enhances data integrity, transparency, and trust in DT environments. This paper examines security vulnerabilities associated with DTs and explores blockchain-based solutions to mitigate these challenges. A case study is presented involving how blockchain-based DTs can facilitate secure, decentralized data sharing between autonomous connected vehicles and traffic infrastructure. This integration supports real-time vehicle tracking, collision avoidance, and optimized traffic flow through secure data exchange between the DTs of vehicles and traffic lights. The study also reviews performance metrics for evaluating blockchain and DT systems and outlines future research directions. By highlighting the collaboration between blockchain and DTs, the paper proposes a pathway towards building more resilient, secure, and intelligent digital ecosystems for critical applications. Full article
Show Figures

Figure 1

18 pages, 1429 KB  
Article
Blockchain-Based Risk Management in Cross-Border Data Supply Chains: A Comparative Analysis of Alibaba and Infosys
by Snovia Naseem and Tang Yong
Sustainability 2025, 17(17), 7704; https://doi.org/10.3390/su17177704 - 27 Aug 2025
Abstract
Cross-border data flows are critical to the operation of global supply chains, particularly for digital enterprises such as Alibaba and Infosys. However, these flows introduce substantial challenges related to digital supply chain risk and cybersecurity management. This study examines how blockchain technology addresses [...] Read more.
Cross-border data flows are critical to the operation of global supply chains, particularly for digital enterprises such as Alibaba and Infosys. However, these flows introduce substantial challenges related to digital supply chain risk and cybersecurity management. This study examines how blockchain technology addresses these challenges within the operational contexts of Alibaba and Infosys. Unlike earlier research that often focused on sector-specific implementations or conceptual models, this study positions its findings within broader empirical evidence on blockchain-enabled supply chain governance, offering a comparative perspective that has been largely absent in prior work. Using an explanatory mixed-methods approach, the research combines thematic analysis of 85 peer-reviewed studies with in-depth case evaluations of the two firms. NVivo-based qualitative coding was applied to supporting sources, including GDPR audit reports, blockchain transaction records, and company disclosures. The findings demonstrate that blockchain adoption reduces cybersecurity breaches, enhances data integrity, and improves supply chain resilience. The study further shows how blockchain integration strengthens digital collaboration and regulatory alignment, enabling secure and uninterrupted data flows that support operational continuity and innovation. Overall, the research offers practical insights for digital enterprises and contributes to a deeper understanding of blockchain’s strategic role in cross-border data risk management. Full article
(This article belongs to the Special Issue Advances in Sustainable Supply Chain Management and Logistics)
Show Figures

Figure 1

11 pages, 1375 KB  
Proceeding Paper
Unveiling Cyber Threats: An In-Depth Study on Data Mining Techniques for Exploit Attack Detection
by Abdallah S. Hyassat, Raneem E. Abu Zayed, Eman A. Al Khateeb, Ahmad Shalaldeh, Mahmoud M. Abdelhamied and Iyas Qaddara
Eng. Proc. 2025, 104(1), 28; https://doi.org/10.3390/engproc2025104028 - 25 Aug 2025
Abstract
The number of people and applications using the internet has increased substantially in recent years. The increased use of the internet has also resulted in various security issues. As the volume of data increases, cyber-attacks become increasingly sophisticated, exploiting vulnerabilities in network structures. [...] Read more.
The number of people and applications using the internet has increased substantially in recent years. The increased use of the internet has also resulted in various security issues. As the volume of data increases, cyber-attacks become increasingly sophisticated, exploiting vulnerabilities in network structures. The incorporation of modern technologies, particularly data mining, emerges as an essential method for analyzing huge amounts of data in real time, enabling the proactive detection of anomalies and potential security breaches. This research seeks to identify the most robust machine learning model for exploit detection. It applies five feature selection techniques and eight classification models to the UNSW-NB15 dataset. A comprehensive evaluation is conducted based on classification accuracy, computational efficiency, and execution time. The results demonstrate the efficiency of the Decision Tree model using Random Forest for feature selection in the real-time detection of exploit attacks, exhibiting an accuracy of 87.9%, along with a very short training (0.96 s) and testing time (0.29 ms/record). Full article
Show Figures

Figure 1

24 pages, 2123 KB  
Review
Artificial Intelligence for Predicting Insolvency in the Construction Industry—A Systematic Review and Empirical Feature Derivation
by Janappriya Jayawardana, Pabasara Wijeratne, Zora Vrcelj and Malindu Sandanayake
Buildings 2025, 15(17), 2988; https://doi.org/10.3390/buildings15172988 - 22 Aug 2025
Viewed by 146
Abstract
The construction sector is particularly prone to financial instability, with insolvencies occurring more frequently among micro- and small-scale firms. The current study explores the application of artificial intelligence (AI) and machine learning (ML) models for predicting insolvency within this sector. The research combined [...] Read more.
The construction sector is particularly prone to financial instability, with insolvencies occurring more frequently among micro- and small-scale firms. The current study explores the application of artificial intelligence (AI) and machine learning (ML) models for predicting insolvency within this sector. The research combined a structured literature review with empirical analysis of construction sector-level insolvency data spanning the recent decade. A critical review of studies highlighted a clear shift from traditional statistical methods to AI/ML-driven approaches, with ensemble learning, neural networks, and hybrid learning models demonstrating superior predictive accuracy and robustness. While current predictive models mostly rely on financial ratio-based inputs, this research complements this foundation by introducing additional sector-specific variables. Empirical analysis reveals persistent patterns of distress, with micro- and small-sized construction businesses accounting for approximately 92% to 96% of insolvency cases each year in the Australian construction sector. Key risk signals such as firm size, cash flow risks, governance breaches and capital adequacy issues were translated into practical features that may enhance the predictive sensitivity of the existing models. The study also emphasises the need for digital self-assessment tools to support micro- and small-scale contractors in evaluating their financial health. By transforming predictive insights into accessible, real-time evaluations, such tools can facilitate early interventions and reduce the risk of insolvency among vulnerable construction firms. The current study combines insights from the review of AI/ML insolvency prediction models with sector-specific feature derivation, potentially providing a foundation for future research and practical adaptation in the construction context. Full article
Show Figures

Figure 1

30 pages, 2921 KB  
Article
Privacy Protection in AI Transformation Environments: Focusing on Integrated Log System and AHP Scenario Prioritization
by Dong-Sung Lim and Sang-Joon Lee
Sensors 2025, 25(16), 5181; https://doi.org/10.3390/s25165181 - 20 Aug 2025
Viewed by 308
Abstract
Recent advancements in emerging technologies such as IoT and AI have driven digital innovation, while also accelerating the sophistication of cyberattacks and expanding the attack surface. In particular, inter-state cyber warfare, sophisticated ransomware threats, and insider-led personal data breaches have emerged as significant [...] Read more.
Recent advancements in emerging technologies such as IoT and AI have driven digital innovation, while also accelerating the sophistication of cyberattacks and expanding the attack surface. In particular, inter-state cyber warfare, sophisticated ransomware threats, and insider-led personal data breaches have emerged as significant new security risks. In response, this study proposes a Privacy-Aware Integrated Log System model developed to mitigate diverse security threats. By analyzing logs generated from personal information processing systems and security systems, integrated scenarios were derived. These scenarios are designed to defend against various threats, including insider attempts to leak personal data and the evasion of security systems, enabling scenario-based contextual analysis that goes beyond simple event-driven detection. Furthermore, the Analytic Hierarchy Process (AHP) was applied to quantitatively assess the relative importance of each scenario, demonstrating the model’s practical applicability. This approach supports early identification and effective response to personal data breaches, particularly when time and resources are limited by focusing on the top-ranked scenarios based on relative importance. Therefore, this study is significant in that it goes beyond fragmented log analysis to establish a privacy-oriented integrated log system from a holistic perspective, and it further validates its operational efficiency in field applications by conducting an AHP-based relative importance evaluation. Full article
Show Figures

Figure 1

29 pages, 2673 KB  
Article
DARTPHROG: A Superscalar Homomorphic Accelerator
by Alexander Magyari and Yuhua Chen
Sensors 2025, 25(16), 5176; https://doi.org/10.3390/s25165176 - 20 Aug 2025
Viewed by 375
Abstract
Fully Homomorphic Encryption (FHE) allows a client to share their data with an external server without ever exposing their data. FHE serves as a potential solution for data breaches and the marketing of users’ private data. Unfortunately, FHE is much slower than conventional [...] Read more.
Fully Homomorphic Encryption (FHE) allows a client to share their data with an external server without ever exposing their data. FHE serves as a potential solution for data breaches and the marketing of users’ private data. Unfortunately, FHE is much slower than conventional asymmetric cryptography, where data are encrypted only between endpoints. Within this work, we propose the Dynamic AcceleRaTor for Parallel Homomorphic pROGrams, DARTPHROG, as a potential tool for accelerating FHE. DARTPHROG is a superscalar architecture, allowing multiple homomorphic operations to be executed in parallel. Furthermore, DARTPHROG is the first to utilize the new Hardware Optimized Modular-Reduction (HOM-R) system, showcasing the uniquely efficient method compared to Barrett and Montgomery reduction. Coming in at 40.5 W, DARTPHROG is one of the smaller architectures for FHE acceleration. Our architecture offers speedups of up to 1860 times for primitive FHE operations such as ciphertext/plaintext and ciphertext/ciphertext addition, subtraction, and multiplication when operations are performed in parallel using the superscalar feature in DARTPHROG. The DARTPHROG system implements an assembler, a unique instruction set based on THUMB, and a homomorphic processor implemented on a Field Programmable Gate Array (FPGA). DARTPHROG is also the first superscalar evaluation of homomorphic operations when the Number Theoretic Transform (NTT) is excluded from the design. Our processor can therefore be used as a base case for evaluation when weighing the resource and execution impact of NTT implementations. Full article
Show Figures

Figure 1

18 pages, 5825 KB  
Article
Detection and Localization of Hidden IoT Devices in Unknown Environments Based on Channel Fingerprints
by Xiangyu Ju, Yitang Chen, Zhiqiang Li and Biao Han
Big Data Cogn. Comput. 2025, 9(8), 214; https://doi.org/10.3390/bdcc9080214 - 20 Aug 2025
Viewed by 307
Abstract
In recent years, hidden IoT monitoring devices installed indoors have raised significant concerns about privacy breaches and other security threats. To address the challenges of detecting such devices, low positioning accuracy, and lengthy detection times, this paper proposes a hidden device detection and [...] Read more.
In recent years, hidden IoT monitoring devices installed indoors have raised significant concerns about privacy breaches and other security threats. To address the challenges of detecting such devices, low positioning accuracy, and lengthy detection times, this paper proposes a hidden device detection and localization system that operates on the Android platform. This technology utilizes the Received Signal Strength Indication (RSSI) signals received by the detection terminal device to achieve the detection, classification, and localization of hidden IoT devices in unfamiliar environments. This technology integrates three key designs: (1) actively capturing the RSSI sequence of hidden devices by sending RTS frames and receiving CTS frames, which is used to generate device channel fingerprints and estimate the distance between hidden devices and detection terminals; (2) training an RSSI-based ranging model using the XGBoost algorithm, followed by multi-point localization for accurate positioning; (3) implementing augmented reality-based visual localization to support handheld detection terminals. This prototype system successfully achieves active data sniffing based on RTS/CTS and terminal localization based on the RSSI-based ranging model, effectively reducing signal acquisition time and improving localization accuracy. Real-world experiments show that the system can detect and locate hidden devices in unfamiliar environments, achieving an accuracy of 98.1% in classifying device types. The time required for detection and localization is approximately one-sixth of existing methods, with system runtime maintained within 5 min. The localization error is 0.77 m, a 48.7% improvement over existing methods with an average error of 1.5 m. Full article
Show Figures

Figure 1

17 pages, 1684 KB  
Article
Privacy-Preserving EV Charging Authorization and Billing via Blockchain and Homomorphic Encryption
by Amjad Aldweesh and Someah Alangari
World Electr. Veh. J. 2025, 16(8), 468; https://doi.org/10.3390/wevj16080468 - 17 Aug 2025
Viewed by 312
Abstract
Electric vehicle (EV) charging infrastructures raise significant concerns about data security and user privacy because traditional centralized authorization and billing frameworks expose sensitive information to breaches and profiling. To address these vulnerabilities, we propose a novel decentralized framework that couples a permissioned blockchain [...] Read more.
Electric vehicle (EV) charging infrastructures raise significant concerns about data security and user privacy because traditional centralized authorization and billing frameworks expose sensitive information to breaches and profiling. To address these vulnerabilities, we propose a novel decentralized framework that couples a permissioned blockchain with fully homomorphic encryption (FHE). Unlike prior blockchain-only or blockchain-and-machine-learning solutions, our architecture performs all authorization and billing computations on encrypted data and records transactions immutably via smart contracts. We implemented the system on Hyperledger Fabric using the CKKS-based TenSEAL library, chosen for its efficient arithmetic on real-valued vectors, and show that homomorphic operations are executed off-chain within a secure computation layer while smart contracts handle only encrypted records. In a simulation involving 20 charging stations and up to 100 concurrent users, the proposed system achieved an average authorization latency of 610 ms, a billing computation latency of 310 ms, and transaction throughput of 102 Tx min while maintaining energy overhead below 0.14 kWh day per station. When compared to state-of-the-art blockchain-only approaches, our method reduces data exposure by 100%, increases privacy from “moderate” to “very high,” and achieves similar throughput with acceptable computational overhead. These results demonstrate that privacy-preserving EV charging is practical using present-day cryptography, paving the way for secure, scalable EV charging and billing services. Full article
(This article belongs to the Special Issue New Trends in Electrical Drives for EV Applications)
Show Figures

Figure 1

21 pages, 5386 KB  
Article
Performance Evaluation of ChaosFortress Lightweight Cryptographic Algorithm for Data Security in Water and Other Utility Management
by Rohit Raphael, Ranjan Sarukkalige, Sridharakumar Narasimhan and Himanshu Agrawal
Sensors 2025, 25(16), 5103; https://doi.org/10.3390/s25165103 - 17 Aug 2025
Viewed by 466
Abstract
The Internet of Things (IoT) has become an integral part of today’s smart and digitally connected world. IoT devices and technologies now connect almost every aspect of daily life, generating, storing, and analysing vast amounts of data. One important use of IoT is [...] Read more.
The Internet of Things (IoT) has become an integral part of today’s smart and digitally connected world. IoT devices and technologies now connect almost every aspect of daily life, generating, storing, and analysing vast amounts of data. One important use of IoT is in utility management, where essential services such as water are supplied through IoT-enabled infrastructure to ensure fair, efficient, and sustainable delivery. The large volumes of data produced by water distribution networks must be safeguarded against manipulation, theft, and other malicious activities. Incidents such as the Queensland user data breach (2020–21), the Oldsmar water treatment plant attack (2021), and the Texas water system overflow (2024) show that attacks on water treatment plants, distribution networks, and supply infrastructure are common in Australia and worldwide, often due to inadequate security measures and limited technical resources. Lightweight cryptographic algorithms are particularly valuable in this context, as they are well-suited for resource-constrained hardware commonly used in IoT systems. This study focuses on the in-house developed ChaosFortress lightweight cryptographic algorithm, comparing its performance with other widely used lightweight cryptographic algorithms. The evaluation and comparative testing used an Arduino and a LoRa-based transmitter/receiver pair, along with the NIST Statistical Test Suite (STS). These tests assessed the performance of ChaosFortress against popular lightweight cryptographic algorithms, including ACORN, Ascon, ChaChaPoly, Speck, tinyAES, and tinyECC. ChaosFortress was equal in performance to the other algorithms in overall memory management but outperformed five of the six in execution speed. ChaosFortress achieved the quickest transmission time and topped the NIST STS results, highlighting its strong suitability for IoT applications. Full article
Show Figures

Figure 1

16 pages, 1949 KB  
Article
Secure Integration of Sensor Networks and Distributed Web Systems for Electronic Health Records and Custom CRM
by Marian Ileana, Pavel Petrov and Vassil Milev
Sensors 2025, 25(16), 5102; https://doi.org/10.3390/s25165102 - 17 Aug 2025
Viewed by 405
Abstract
In the context of modern healthcare, the integration of sensor networks into electronic health record (EHR) systems introduces new opportunities and challenges related to data privacy, security, and interoperability. This paper proposes a secure distributed web system architecture that integrates real-time sensor data [...] Read more.
In the context of modern healthcare, the integration of sensor networks into electronic health record (EHR) systems introduces new opportunities and challenges related to data privacy, security, and interoperability. This paper proposes a secure distributed web system architecture that integrates real-time sensor data with a custom customer relationship management (CRM) module to optimize patient monitoring and clinical decision-making. The architecture leverages IoT-enabled medical sensors to capture physiological signals, which are transmitted through secure communication channels and stored in a modular EHR system. Security mechanisms such as data encryption, role-based access control, and distributed authentication are embedded to address threats related to unauthorized access and data breaches. The CRM system enables personalized healthcare management while respecting strict privacy constraints defined by current healthcare standards. Experimental simulations validate the scalability, latency, and data protection performance of the proposed system. The results confirm the potential of combining CRM, sensor data, and distributed technologies to enhance healthcare delivery while ensuring privacy and security compliance. Full article
(This article belongs to the Special Issue Privacy and Security in Sensor Networks)
Show Figures

Figure 1

18 pages, 1417 KB  
Article
A Fusion-Based Approach with Bayes and DeBERTa for Efficient and Robust Spam Detection
by Ao Zhang, Kelei Li and Haihua Wang
Algorithms 2025, 18(8), 515; https://doi.org/10.3390/a18080515 - 15 Aug 2025
Viewed by 295
Abstract
Spam emails pose ongoing risks to digital security, including data breaches, privacy violations, and financial losses. Addressing the limitations of traditional detection systems in terms of accuracy, adaptability, and resilience remains a significant challenge. In this paper, we propose a hybrid spam detection [...] Read more.
Spam emails pose ongoing risks to digital security, including data breaches, privacy violations, and financial losses. Addressing the limitations of traditional detection systems in terms of accuracy, adaptability, and resilience remains a significant challenge. In this paper, we propose a hybrid spam detection framework that integrates a classical multinomial naive Bayes classifier with a pre-trained large language model, DeBERTa. The framework employs a weighted probability fusion strategy to combine the strengths of both models—lexical pattern recognition and deep semantic understanding—into a unified decision process. We evaluate the proposed method on a widely used spam dataset. Experimental results demonstrate that the hybrid model achieves superior performance in terms of accuracy and robustness when compared with other classifiers. The findings support the effectiveness of hybrid modeling in advancing spam detection techniques. Full article
(This article belongs to the Section Evolutionary Algorithms and Machine Learning)
Show Figures

Figure 1

26 pages, 498 KB  
Article
What Determines Digital Financial Literacy? Evidence from a Large-Scale Investor Study in Japan
by Sumeet Lal, Aliyu Ali Bawalle, Mostafa Saidur Rahim Khan and Yoshihiko Kadoya
Risks 2025, 13(8), 149; https://doi.org/10.3390/risks13080149 - 12 Aug 2025
Viewed by 1241
Abstract
The digitalization of financial systems has intensified risks such as cyber fraud, data breaches, and financial exclusion, particularly for individuals with low digital financial literacy (DFL). As digital finance becomes ubiquitous, DFL has emerged as a critical competency. However, the determinants of DFL [...] Read more.
The digitalization of financial systems has intensified risks such as cyber fraud, data breaches, and financial exclusion, particularly for individuals with low digital financial literacy (DFL). As digital finance becomes ubiquitous, DFL has emerged as a critical competency. However, the determinants of DFL remain insufficiently explored. This study aims to validate a comprehensive, theory-driven model that identifies the key sociodemographic, economic, and psychological factors that influence DFL acquisition among investors. Drawing on six established learning and behavioral theories—we analyze data from 158,169 active account holders in Japan through ordinary least squares regression. The results show that higher levels of DFL are associated with being male, younger or middle-aged, highly educated, and unemployed and having greater household income and assets. In contrast, being married, having children, holding a myopic view of the future, and high risk aversion are linked to lower DFL. Interaction effects show a stronger income–DFL association for males and a diminishing return for reduced education with age. Robustness checks using a probit model with a binary DFL measure confirmed the OLS results. These findings highlight digital inequalities and behavioral barriers that shape DFL acquisition. This study contributes a validated framework for identifying at-risk groups and supports future interventions to enhance inclusive digital financial capabilities in increasingly digital economies. Full article
7 pages, 208 KB  
Proceeding Paper
Post-Quantum Crystal-Kyber Group-Oriented Encryption Scheme for Cloud Security in Personal Health Records
by Zhen-Yu Wu and Chia-Hui Liu
Eng. Proc. 2025, 103(1), 6; https://doi.org/10.3390/engproc2025103006 - 6 Aug 2025
Viewed by 391
Abstract
As medical technology develops and digital demands grow, personal health records (PHRs) are becoming more patient-centered than before based on cloud-based health information exchanges. While enhancing data accessibility and sharing, these systems present privacy and security issues, including data breaches and unauthorized access. [...] Read more.
As medical technology develops and digital demands grow, personal health records (PHRs) are becoming more patient-centered than before based on cloud-based health information exchanges. While enhancing data accessibility and sharing, these systems present privacy and security issues, including data breaches and unauthorized access. We developed a post-quantum, group-oriented encryption scheme using the Crystal-Kyber Key encapsulation mechanism (KEM). Leveraging lattice-based post-quantum cryptography, this scheme ensures quantum resilience and chosen ciphertext attack security for layered cloud PHR environments. It supports four encryption modes: individual, group, subgroup-specific, and authorized subgroup decryption, meeting diverse data access needs. With efficient key management requiring only one private key per user, the developed scheme strengthens the privacy and security of PHRs in a future-proof, flexible, and scalable manner. Full article
42 pages, 5651 KB  
Article
Towards a Trustworthy Rental Market: A Blockchain-Based Housing System Architecture
by Ching-Hsi Tseng, Yu-Heng Hsieh, Yen-Yu Chang and Shyan-Ming Yuan
Electronics 2025, 14(15), 3121; https://doi.org/10.3390/electronics14153121 - 5 Aug 2025
Viewed by 470
Abstract
This study explores the transformative potential of blockchain technology in overhauling conventional housing rental systems. It specifically addresses persistent issues, such as information asymmetry, fraudulent listings, weak Rental Agreements, and data breaches. A comprehensive review of ten academic publications highlights the architectural frameworks, [...] Read more.
This study explores the transformative potential of blockchain technology in overhauling conventional housing rental systems. It specifically addresses persistent issues, such as information asymmetry, fraudulent listings, weak Rental Agreements, and data breaches. A comprehensive review of ten academic publications highlights the architectural frameworks, underlying technologies, and myriad benefits of decentralized rental platforms. The intrinsic characteristics of blockchain—immutability, transparency, and decentralization—are pivotal in enhancing the credibility of rental information and proactively preventing fraudulent activities. Smart contracts emerge as a key innovation, enabling the automated execution of Rental Agreements, thereby significantly boosting efficiency and minimizing reliance on intermediaries. Furthermore, Decentralized Identity (DID) solutions offer a robust mechanism for securely managing identities, effectively mitigating risks associated with data leakage, and fostering a more trustworthy environment. The suitability of platforms such as Hyperledger Fabric for developing such sophisticated rental systems is also critically evaluated. Blockchain-based systems promise to dramatically increase market transparency, bolster transaction security, and enhance fraud prevention. They also offer streamlined processes for dispute resolution. Despite these significant advantages, the widespread adoption of blockchain in the rental sector faces several challenges. These include inherent technological complexity, adoption barriers, the need for extensive legal and regulatory adaptation, and critical privacy concerns (e.g., ensuring compliance with GDPR). Furthermore, blockchain scalability limitations and the intricate balance between data immutability and the necessity for occasional data corrections present considerable hurdles. Future research should focus on developing user-friendly DID solutions, enhancing blockchain performance and cost-efficiency, strengthening smart contract security, optimizing the overall user experience, and exploring seamless integration with emerging technologies. While current challenges are undeniable, blockchain technology offers a powerful suite of tools for fundamentally improving the rental market’s efficiency, transparency, and security, exhibiting significant potential to reshape the entire rental ecosystem. Full article
(This article belongs to the Special Issue Blockchain Technologies: Emerging Trends and Real-World Applications)
Show Figures

Figure 1

Back to TopTop