학술논문
A Double Protecting Approach for Data Privacy
Document Type
Conference
Author
Source
2023 10th International Conference on Computing for Sustainable Global Development (INDIACom) Computing for Sustainable Global Development (INDIACom), 2023 10th International Conference on. :360-366 Mar, 2023
Subject
Language
Abstract
Hackers have become more vigilant and malicious. Thus, cases of direct threats and blackmail, which lead to hacking and theft of users' data, have increased over the years. As such, it is necessary to build effective privacy protection methods and techniques that can guarantee users' data privacy even in the presence of a malicious attacker or an unreliable service provider. In this view, this study proposes a double approach for protecting users' data in a crowd. The study uses a systematic literature review method to identify technologies that have been advanced to ensure data privacy. These technologies include encryption, data mining techniques, obfuscation, dummies, and TTP. Unfortunately, all these methods have significant weaknesses that hinder them from effectively achieving data security and protection. As such, the current study proposes a new approach to privacy that can enhance the effectiveness of existing methods without impacting their performance. This approach also supports complex systems such as those used in crowd management and a wide variety of applications within these systems. Ideally, the double-approach method proposed in this study is a collection of various technologies that rely on two primary conditions: doubling the work of traditional data protection methods and using fog computing to enhance the efficiency and overall performance of these methods. This way, the new approach will effectively serve different complex systems and applications used in crowd management.