Siriboon Chaisawat, Kajornsak Piyoungkorn, Soontorn Sirapaisan, C. Vorakulpipat
{"title":"Towards Data Minimization and Access Control for Immunization Data Sharing","authors":"Siriboon Chaisawat, Kajornsak Piyoungkorn, Soontorn Sirapaisan, C. Vorakulpipat","doi":"10.1145/3508397.3564837","DOIUrl":"https://doi.org/10.1145/3508397.3564837","url":null,"abstract":"The global interest in taking preventative measures has intensified in response to the coronavirus epidemic. The vaccination certificate is one approach used to control the spread of disease while enabling people to carry out their regular lives and interact with each other as they normally would. Most services require their users to provide proof of immunization; however, the information they require seems to be either overly personal or unrelated to the service's intended use. Immunization Information System (IIS), the data owner, is indeed accountable for safeguarding client data and privacy in accordance with ethical considerations. In order to ensure that requests for data access are acknowledged by data subjects and that only the fields required to fulfill the usage purpose are given, some mechanisms must be presented. In this study, consent management blockchain with add-on modules that enable loose-coupling integration with existing vaccination applications is presented in an attempt to provide such functionality without adding extra burden to IIS. To limit the quantity and sensitivity of the data retrieved, a data filtering scheme is proposed. Additionally, a source authentication technique is introduced to guarantee that data is delivered to the authorized requesters. To make sure all transaction requests are processed regardless of limitations in the execution capability of the blockchain, job queues are presented to reduce transactions' conflicts. This allows multiple transactions to be executed in parallel and resolves scalability and performance concerns which are the major issues found when integrating blockchain with large-scaled production systems.","PeriodicalId":266269,"journal":{"name":"Proceedings of the 14th International Conference on Management of Digital EcoSystems","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133509497","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Ownership Protection of Specified Image Data Using Blockchain Technology","authors":"Natsuki Fujiwara, Shohei Yokoyama","doi":"10.1145/3508397.3564843","DOIUrl":"https://doi.org/10.1145/3508397.3564843","url":null,"abstract":"We propose a method to protect ownership of specified areas on image data using blockchain. Different values are assigned corresponding to the object's importance in the region and the ownership of the area is managed and given to the required user. The detected areas are individually encrypted by XOR cipher, and a corresponding key image is created to decrypt to protect ownership of selected object regions detected by the object recognition algorithm. We use non-fungible tokens(NFTs) to secure key images by managing ownership of each object on image data. Key images to decrypt are registered as NFTs. Ownership NFTs are also created to access and retrieve the key image NFTs. Each key image NFT is generated by key holders and ownership NFTs are obtained by users requiring them. In addition, there is a judging function that clarifies if ownership and key NFTs match. Key NFTs appear on the screen only when they are matched. With this method, we can give different value to partial areas of image and ensure ownership of them. Besides, ownership can be transferred and shared with multiple people. Furthermore, original image holders can get financial profit depending on how valuable the images are. Lastly, this method would improve securing image data.","PeriodicalId":266269,"journal":{"name":"Proceedings of the 14th International Conference on Management of Digital EcoSystems","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122834957","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multi-Line Customized Bus Planner for On-Demand Origin-Destination Travel Requests","authors":"Giacomo Chiarot, C. Silvestri","doi":"10.1145/3508397.3564852","DOIUrl":"https://doi.org/10.1145/3508397.3564852","url":null,"abstract":"Replacing private transport in large cities with public and shared alternatives is increasingly relevant to reduce congestion during rush hours and air pollution. The activation of customized bus services is one of the possible strategies toward that goal, and automatic bus route design is needed when the amount of pickup addresses to manage is large. The approaches described in the literature are not suitable for real-world applications because they tend to generate many more lines than necessary, or they don't work if addresses do not form clusters. In this paper, we propose a novel bus line generation approach suitable for any address database.","PeriodicalId":266269,"journal":{"name":"Proceedings of the 14th International Conference on Management of Digital EcoSystems","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122483993","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Semantic Text Expansion for Paraphrasing Identification in Arabic Microblog Posts","authors":"B. Al-Shboul, Duha Al-Darras, D. A. Qudah","doi":"10.1145/3508397.3564848","DOIUrl":"https://doi.org/10.1145/3508397.3564848","url":null,"abstract":"An enormous number of microblogs are being created and posted on the web each day. Many of these microblogs are repetitive in terms of content and similar in terms of topic. Being able to detect repetitive content can support various applications such as question answering and trendy topic detection. In this research, we aim to propose a model to detect paraphrasing among Arabic tweets, in addition to identifying tweets belonging to the same topic. The proposed model is based on Latent Dirichlet Allocation (LDA) topic modeling, as well as, semantic text expansion utilizing external resources i.e. BabelNet and Wikipedia. Tweets from multiple Arabic news agencies were collected, preprocessed, and divided into two groups. The first group was used to build the topic modeling and the other group of tweets was paired and classified based on the topic distributions. The results are promising in terms of precision on tweet pairs with a certain time overlap. The best-reported precision is 80.1% achieved using Wikipedia embedded content on the stemmed text mode with a large number of LDA topics.","PeriodicalId":266269,"journal":{"name":"Proceedings of the 14th International Conference on Management of Digital EcoSystems","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122071612","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Proceedings of the 14th International Conference on Management of Digital EcoSystems","authors":"","doi":"10.1145/3508397","DOIUrl":"https://doi.org/10.1145/3508397","url":null,"abstract":"","PeriodicalId":266269,"journal":{"name":"Proceedings of the 14th International Conference on Management of Digital EcoSystems","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129901106","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}