학술논문

A Double Protecting Approach for Data Privacy
Document Type
Conference
Source
2023 10th International Conference on Computing for Sustainable Global Development (INDIACom) Computing for Sustainable Global Development (INDIACom), 2023 10th International Conference on. :360-366 Mar, 2023
Subject
Bioengineering
Communication, Networking and Broadcast Technologies
Components, Circuits, Devices and Systems
Computing and Processing
Engineering Profession
Fields, Waves and Electromagnetics
General Topics for Engineers
Geoscience
Nuclear Engineering
Photonics and Electrooptics
Power, Energy and Industry Applications
Robotics and Control Systems
Signal Processing and Analysis
Transportation
Privacy
Systematics
Computer hacking
Data security
Data protection
Fingerprint recognition
Encryption
Crowd management
data privacy
data security
encryption
hackers
Language
Abstract
Hackers have become more vigilant and malicious. Thus, cases of direct threats and blackmail, which lead to hacking and theft of users' data, have increased over the years. As such, it is necessary to build effective privacy protection methods and techniques that can guarantee users' data privacy even in the presence of a malicious attacker or an unreliable service provider. In this view, this study proposes a double approach for protecting users' data in a crowd. The study uses a systematic literature review method to identify technologies that have been advanced to ensure data privacy. These technologies include encryption, data mining techniques, obfuscation, dummies, and TTP. Unfortunately, all these methods have significant weaknesses that hinder them from effectively achieving data security and protection. As such, the current study proposes a new approach to privacy that can enhance the effectiveness of existing methods without impacting their performance. This approach also supports complex systems such as those used in crowd management and a wide variety of applications within these systems. Ideally, the double-approach method proposed in this study is a collection of various technologies that rely on two primary conditions: doubling the work of traditional data protection methods and using fog computing to enhance the efficiency and overall performance of these methods. This way, the new approach will effectively serve different complex systems and applications used in crowd management.