Information Technology Reference
In-Depth Information
Overall, content-based retrieval has been found to be more accurate and
efficient than name-based retrieval in hybrid P2P networks and content-
based resource selection is more accurate and more efficient for content-
based retrieval in hybrid P2P networks, compared with simple match-based
resource selection algorithms. Unfortunately, considering the body of exist-
ing work in the area would suggest that the security and privacy issues have
been somewhat left behind. There remains a need to combine security and
privacy issues into the processes involved in the access of multimedia data
through P2P networks.
12.2.4 Data Privacy and Security
In this section we discuss previous work focusing on the need for further
research in security policies, privacy frameworks for data integration and
sharing, and policies for access control based on authorization for general
multimedia data and for video databases.
Verdon [29] explains that every software developer needs to create a good
security policy and then needs to follow it. A good security policy can pro-
tect our personal and confidential data, our software applications, and our
databases when attacked by hackers or as a result of customer complaints
arising through lawsuits. The author lists several policy types such as cor-
porate security policies, acceptable-use policies, privacy policies, e-mail
policies, information system policies, network security policies, data clas-
sification policies and so on. A number of suggestions from the author can
be considered in relation to human life memory stores. E-mail policies, for
example, such as the requirement that a user cannot simply forward an
e-mail to a third party that contains another person's e-mail address, can
protect other e-mail addresses from being exposed to the wrong people. A
significant information system secure operation policy (system access con-
trol, firewall policy, physical security, etc.) and a data classification policy are
the most critical aspects needed to be considered as the main security policy
in my project. The issue here is how to integrate a good privacy policy, secu-
rity policy, and network security policy into one system.
As highlighted by Clifton et al. [30], data integration and sharing is a big
challenge for the database community. The authors propose a privacy frame-
work named Sharing Scientific Research Data, which includes privacy views,
privacy policies, and purpose statements, for defining private data and pri-
vacy policies in the context of data integration and sharing. The authors
develop schema-matching solutions that do not expose the source data or
schema. They need to develop the components of match prediction, human
verification of matches, and mapping creation before matching algorithms
that preserve privacy can be done.
Bechara et al. [31] explain about the problem of multimedia data autho-
rization and access control when multimedia data is accessed through the
Internet. This problem becomes more complex when attempting to protect
Search WWH ::




Custom Search