Privacy Protection - Emerging Issues and Technological Responses
Ayush Gupta1 , Manvi Gupta2
Section:Review Paper, Product Type: Journal Paper
Volume-9 ,
Issue-5 , Page no. 47-54, May-2021
CrossRef-DOI: https://doi.org/10.26438/ijcse/v9i5.4754
Online published on May 31, 2021
Copyright © Ayush Gupta, Manvi Gupta . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
View this paper at Google Scholar | DPI Digital Library
How to Cite this Paper
- IEEE Citation
- MLA Citation
- APA Citation
- BibTex Citation
- RIS Citation
IEEE Style Citation: Ayush Gupta, Manvi Gupta, “Privacy Protection - Emerging Issues and Technological Responses,” International Journal of Computer Sciences and Engineering, Vol.9, Issue.5, pp.47-54, 2021.
MLA Style Citation: Ayush Gupta, Manvi Gupta "Privacy Protection - Emerging Issues and Technological Responses." International Journal of Computer Sciences and Engineering 9.5 (2021): 47-54.
APA Style Citation: Ayush Gupta, Manvi Gupta, (2021). Privacy Protection - Emerging Issues and Technological Responses. International Journal of Computer Sciences and Engineering, 9(5), 47-54.
BibTex Style Citation:
@article{Gupta_2021,
author = {Ayush Gupta, Manvi Gupta},
title = {Privacy Protection - Emerging Issues and Technological Responses},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {5 2021},
volume = {9},
Issue = {5},
month = {5},
year = {2021},
issn = {2347-2693},
pages = {47-54},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=5336},
doi = {https://doi.org/10.26438/ijcse/v9i5.4754}
publisher = {IJCSE, Indore, INDIA},
}
RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v9i5.4754}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=5336
TI - Privacy Protection - Emerging Issues and Technological Responses
T2 - International Journal of Computer Sciences and Engineering
AU - Ayush Gupta, Manvi Gupta
PY - 2021
DA - 2021/05/31
PB - IJCSE, Indore, INDIA
SP - 47-54
IS - 5
VL - 9
SN - 2347-2693
ER -
VIEWS | XML | |
550 | 473 downloads | 182 downloads |
Abstract
Privacy protection as a process of collection, processing and dissemination of Information is a burgeoning issue that is challenging researchers, scientists and regulators. A universal ethical concern of the organizations, individuals and society at large is how the Information is accessed and manipulated. Technology creates implications for the privacy of people in a variety of areas, and privacy Issues appear at a variety of platforms calling for the formation of standards and regulations. The regulations are still evolving and are not optimal since the technological contexts are highly dynamic. Our paper presents the privacy trends, regulation of privacy in some standard frameworks, technological contexts and emerging ethical considerations. We also highlight the ethical issues with privacy protection and motivates to develop new methodologies to handle privacy from a both legal and technological perspective. The technological context and legal framework go together for the protection of privacy. However, privacy issues are complex and will continue to evolve. People have to find the best ways of handling ethical issues in specific situations. Researches on the protection of privacy in various computing environments may be carried out given a specific technology environment that can in customizing for region-specific legislation.
Key-Words / Index Term
Privacy, Regulation, Standards, Data Security, GDPR, Technological Responses
References
[1] Neethling, J., Potgieter, J.M. & Visser, P.J. Neethling`s law of personality. Durban: Butterworths. 1996.
[2] Y. Sun, J. Zhang, Y. Xiong, and G. Zhu, “Data Security and Privacy in Cloud Computing,” International Journal of Distributed Sensor Networks, Vol. 10, Issue 7, p. 190903, 2014.
[3] R. L. Finn, D. Wright, and M. Friedewald, “Seven Types of Privacy,” European Data Protection: Coming of Age, pp. 3–32, 2012.
[4] Feng, D.-G, Zhang, M., Li, H., “Big data security and privacy protection”, JisuanjiXuebao/Chinese Journal of Computers, Vol. 37, pp. 246-258, 2014. 10.3724/SP.J.1016.2014.00246.
[5] P. J. Susn, "Privacy Protection and Data Security in Cloud Computing: A Survey, Challenges, and Solutions," in IEEE Access, Vol. 7, pp. 147420-147452, 2019. DOI: 10.1109/ACCESS.2019.2946185.
[6] A. Ho, A. Maiga, and E. Aimeur, “Privacy protection issues in social networking sites,” 2009 IEEE/ACS International Conference on Computer Systems and Applications, 2009.
[7] Boeckl, K. and Lefkovitz, N.,“NIST Privacy Framework: A Tool for Improving Privacy Through Enterprise Risk Management”, National Institute of Standards and Technology, Gaithersburg, MD, [online], https://doi.org/10.6028/NIST.CSWP.01162020,2020.
[8] Gruzd, A., & Hernández-García, Á., “Privacy concerns and self-disclosure in private and public uses of social media”, Cyberpsychology, Behavior, and Social Networking, Vol. 21, Issue 7, pp. 418-428, 2018. doi:10.1089/cyber.2017.0709.
[9] C. Pilton, S. Faily, and J. Henriksen-Bulmer, “Evaluating privacy - determining user privacy expectations on the web,” Computers & Security, Vol. 105, p. 102241, 2021.
[10] I. Fish, “GDPR: Global Privacy Regulations,” ITNOW, Vol. 61, Issue 2, pp. 30–30, 2019.
[11] F. Nahai, “General Data Protection Regulation (GDPR) and Data Breaches: What You Should Know,” Aesthetic Surgery Journal, Vol. 39, Issue 2, pp. 238–240, 2018.
[12] Treiblmaier, Horst & Madlberger, Maria & Knotzer, Nicolas & Pollach, Irene, “Evaluating Personalization and Customization from an Ethical Point of View: An Empirical Study”, Proceedings of the Hawaii International Conference on System Sciences, 37, 2004. 10.1109/HICSS.2004.1265434.
[13] J. S. Baik, “Data privacy against innovation or against discrimination?: The case of the California Consumer Privacy Act (CCPA),” Telematics and Informatics, Vol. 52, p. 101431, 2020.
[14] Zarsky, T., “Incompatible: The GDPR in the age of big data”, Seton Hall Law Review, Vol. 47, pp. 995-1020, 2017.
[15] R. Lenz, “Big Data: Ethics and Law,” SSRN Electronic Journal, 2019.
[16] K. P. L. Coopamootoo, “Usage Patterns of Privacy-Enhancing Technologies,” Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020.
[17] M. A. Will and R. K. L. Ko, “A guide to homomorphic encryption,” The Cloud Security Ecosystem, pp. 101–127, 2015.
[18] K. El Makkaoui, A. Ezzati and A. B. Hssane, "Challenges of using homomorphic encryption to secure cloud computing," 2015 International Conference on Cloud Technologies and Applications (CloudTech), Marrakech”, pp. 1-7, 2015, Doi: 10.1109/CloudTech.2015.7337011.
[19] D. Chen and H. Zhao, “Data Security and Privacy Protection Issues in Cloud Computing,” 2012 International Conference on Computer Science and Electronics Engineering, 2012.
[20] V. Biksham and D. Vasumathi, “Homomorphic Encryption Techniques for securing Data in Cloud Computing: A Survey,” International Journal of Computer Applications, Vol. 160, No. 6, pp. 1–5, 2017.
[21] Lindell, Yehuda, Pinkas, Benny, “Secure Multiparty Computation for Privacy-Preserving Data Mining”. IACR Cryptology ePrint Archive. 2008. 10.29012/jpc.v1i1.566.
[22] S. Balamurugan, Dr. Sanjay Pande, “Data Security and Cryptography in Cloud Environment”, International Journal of Engineering Research & Technology (IJERT), Vol. 4, Issue 6, 2015. Doi:10.17577/IJERTV4IS061013.
[23] S. L. Garfinkel, J. M. Abowd, and S. Powazek, “Issues Encountered Deploying Differential Privacy,” Proceedings of the 2018 Workshop on Privacy in the Electronic Society, 2018.
[24] Feldman, M., Friedler, S. A., Moeller, J., Scheidegger, C., and Venkatasubramanian, S., “Certifying and Removing Disparate Impact”, In Proceedings of the 21th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining - KDD ’15, pp. 259–268, Sydney, NSW, Australia, 2015. Doi: 10.1145/2783258.2783311.
[25] Gruschka N., V. Mavroeidis, K. Vishi and M. Jensen, "Privacy Issues and Data Protection in Big Data: A Case Study Analysis under GDPR," 2018 IEEE International Conference on Big Data (Big Data), Seattle, WA, USA, , pp. 5027-5033, 2018. doi: 10.1109/BigData.2018.8622621
[26] Y. Shi, “Data Security and Privacy Protection in Public Cloud,” 2018 IEEE International Conference on Big Data (Big Data), 2018.
[27] Shirudkar, K. & Motwani, D. “Big-Data Security”, International Journal of Advanced Research in Computer Science and Software Engineering, Vol. 5, Issue 3, pp. 1100-1109, 2015.
[28] R. Tahboub and Y. Saleh, “Data Leakage/Loss Prevention Systems (DLP),” 2014 World Congress on Computer Applications and Information Systems (WCCAIS), 2014.
[29] Islam, S. M. R., Kwak, D., Kabir, M. H., Hossain, M., and Kwak, K. “The internet of things for health care: a comprehensive survey”. IEEE Access, Vol. 3, pp. 678–708, 2015.
[30] Solangi, Zulfiqar, Solangi, Yasir, Murad, Shah, S Abd Aziz, Madihah, Hamzah, Mohd, Shah, Asadullah. “The future of data privacy and security concerns in Internet of Things”. Vol., 1-4, 2018. 10.1109/ICIRD.2018.8376320.
[31] A Mallareddy, R Sridevi, Ch G V N Prasad, "A Survey of Data Hiding methods for data security in Cloud", International Journal of Computer Sciences and Engineering, Vol.7, Issue.5, pp.690-694, 2019.
[32] Supriya J., Srusti K.S., Gamana G, S. Sukhaniya Ragani, Raghavendra S., Venugopal K.R., "A Survey on Ef?cient and Secure Techniques for Storing Sensitive Data on Cloud", International Journal of Computer Sciences and Engineering, Vol.7, Issue.5, pp.1766-1777, 2019.