scholarly journals Solutions to Big Data Privacy and Security Challenges Associated With COVID-19 Surveillance Systems

2021 ◽  
Vol 4 ◽  
Author(s):  
Vibhushinie Bentotahewa ◽  
Chaminda Hewage ◽  
Jason Williams

The growing dependency on digital technologies is becoming a way of life, and at the same time, the collection of data using them for surveillance operations has raised concerns. Notably, some countries use digital surveillance technologies for tracking and monitoring individuals and populations to prevent the transmission of the new coronavirus. The technology has the capacity to contribute towards tackling the pandemic effectively, but the success also comes at the expense of privacy rights. The crucial point to make is regardless of who uses and which mechanism, in one way another will infringe personal privacy. Therefore, when considering the use of technologies to combat the pandemic, the focus should also be on the impact of facial recognition cameras, police surveillance drones, and other digital surveillance devices on the privacy rights of those under surveillance. The GDPR was established to ensure that information could be shared without causing any infringement on personal data and businesses; therefore, in generating Big Data, it is important to ensure that the information is securely collected, processed, transmitted, stored, and accessed in accordance with established rules. This paper focuses on Big Data challenges associated with surveillance methods used within the COVID-19 parameters. The aim of this research is to propose practical solutions to Big Data challenges associated with COVID-19 pandemic surveillance approaches. To that end, the researcher will identify the surveillance measures being used by countries in different regions, the sensitivity of generated data, and the issues associated with the collection of large volumes of data and finally propose feasible solutions to protect the privacy rights of the people, during the post-COVID-19 era.

2018 ◽  
Vol I (I) ◽  
pp. 26-31
Author(s):  
Javeria Nazeer ◽  
Muhammad Farooq

In recent era, Social networking sites (SNSs) have become an important source of communication and also became a matter of interest for researchers in several disciplines such as communications, technology and sociology. As SNSs are spreading rapidly, new issues regarding privacy and security are also raising. These Social networking sites including Facebook, Twitter etc. often reveal private data through the enclosure of public profiles, photographs, videos and messages send to the family, friends and general public. That is why the researcher is concerned to investigate the impact of Social networking sites (SNSs) on human basic privacy rights. As it was not possible to conduct a survey in complete population, therefore sample of 250 respondents (50% males & 50% females) was selected from different universities and colleges of Lahore, city of Pakistan. In the process of survey, questionnaire technique has been used to obtain the quantitative data. The findings revealed that Social Networking Sites significantly violate the human basic privacy rights. Majority of the respondents were of the view that privacy rights are harmed by SNSs. 10.4% respondents were strongly disagreeing about the statement that Facebook privacy is a real problem, 18.0% were disagree, 20.4% were neutral about the problem while 38.4% said they are agreed and 12.8% were strongly agree. The results also suggested that social networking sites leak personal data and also become a reason for disclosure of personal information. Hence, it is necessary when a user involves in the Social networking site he/she should be aware and vigilant of the privacy and security risks.


2021 ◽  
Author(s):  
Stanton Heister ◽  
Kristi Yuthas

Recent increases in security breaches and digital surveillance highlight the need for improved privacy and security, particularly over users’ personal data. Advances in cybersecurity and new legislation promise to improve data protection. Blockchain and distributed ledger technologies provide novel opportunities for protecting user data through decentralized identity and other privacy mechanisms. These systems can allow users greater sovereignty through tools that enable them to own and control their own data. Artificial intelligence provides further possibilities for enhancing system and user security, enriching data sets, and supporting improved analytical models.


2018 ◽  
Vol 62 (10) ◽  
pp. 1319-1337 ◽  
Author(s):  
Yong Jin Park ◽  
Jae Eun Chung ◽  
Dong Hee Shin

This study presents a conceptual model of understanding algorithmic digital surveillance systems, borrowing insight from Giddens, who proposed the notion of structuration as social practices deriving from the intersection between structure and agents. We argue that the status of privacy, or lack of it, is a product of these interactions, of which the personal data practices and related interests constitute the reproduction of a data ecosystem. We trace the process of data production and consumption, dissecting the interactive dynamics between digital media producers (personal data users) and users (personal data producers). Inadequacies, limits, and social and policy implications of data surveillance and its algorithmic reproduction of identities are discussed.


Now-a-days data plays a key role in Information Technology and while coming to privacy of that data it has become a considerable issue to maintain data security at high level. Large amounts of data generated through devices are considered as a major obstacle and also tough to handle in real time scenarios. To meetwith consistent performance applications at present abandon encryptions techniquesbecausethe time for the execution and the completion of encryption techniques plays a key role during processing and transmissions of data. In this paper our moto is to secure data and proposed a new technique called Dynamic Data Encryption Strategy (DDES)which selectively encrypts data and uses some algorithms which provides a perfect encryption strategy for the data packages under some timing constraints. By this method we can achieve data privacy and security for big-data in mobile cloud-computing by using an encryption strategy respective to their requirements during execution time.


2016 ◽  
Vol 13 (1) ◽  
pp. 204-211
Author(s):  
Baghdad Science Journal

The internet is a basic source of information for many specialities and uses. Such information includes sensitive data whose retrieval has been one of the basic functions of the internet. In order to protect the information from falling into the hands of an intruder, a VPN has been established. Through VPN, data privacy and security can be provided. Two main technologies of VPN are to be discussed; IPSec and Open VPN. The complexity of IPSec makes the OpenVPN the best due to the latter’s portability and flexibility to use in many operating systems. In the LAN, VPN can be implemented through Open VPN to establish a double privacy layer(privacy inside privacy). The specific subnet will be used in this paper. The key and certificate will be generated by the server. An authentication and key exchange will be based on standard protocol SSL/TLS. Various operating systems from open source and windows will be used. Each operating system uses a different hardware specification. Tools such as tcpdump and jperf will be used to verify and measure the connectivity and performance. OpenVPN in the LAN is based on the type of operating system, portability and straightforward implementation. The bandwidth which is captured in this experiment is influenced by the operating system rather than the memory and capacity of the hard disk. Relationship and interoperability between each peer and server will be discussed. At the same time privacy for the user in the LAN can be introduced with a minimum specification.


Author(s):  
Mohanad Halaweh ◽  
Ahmed El Massry

The term BIG DATA has been increasingly used recently. Big data refers to the massive amount of data that are processed and analyzed using sophisticated technology to gain relevant insights that will help top executives with the decision-making process. This study is an attempt to investigate the big data implementation in organizations. The literature review reveals an initial model of indicators that might affect big data implementation. This model was examined and extended by primary data collected from key people (CEO and managers) from ten organizations. The extended model of indicators, which is the result from this research, includes the factors that would affect the success or failure of big data implementation in organizations. The research findings showed the following factors: top management support, organizational change, IT infrastructure, skilled professional, contents (i.e. data), data strategy, data privacy and security.


Author(s):  
Kenneth C. C. Yang ◽  
Yowei Kang

Since its introduction in the early 21st century, mobile social media have played an indispensable part in contemporary human experiences. The convergence of social networking and mobile technologies and services creates a fascinating circumstance because the pervasive nature of mobile social networking technologies has impacted on users' privacy. The chapter employed a mixed research method to collect and analyze mobile social media users' experiences and privacy concerns in the age of Big Data. A total of 57 participants were included in this study. Collected data was analyzed by examining mobile social media users' experiences and their concerns over privacy. Findings from this study showed the rising concerns over personal privacy as a result of convergence of mobile social media and Big Data practices by the advertising industry. Theoretical and practical implications were discussed.


Author(s):  
Kiritkumar J. Modi ◽  
Prachi Devangbhai Shah ◽  
Zalak Prajapati

The rapid growth of digitization in the present era leads to an exponential increase of information which demands the need of a Big Data paradigm. Big Data denotes complex, unstructured, massive, heterogeneous type data. The Big Data is essential to the success in many applications; however, it has a major setback regarding security and privacy issues. These issues arise because the Big Data is scattered over a distributed system by various users. The security of Big Data relates to all the solutions and measures to prevent the data from threats and malicious activities. Privacy prevails when it comes to processing personal data, while security means protecting information assets from unauthorized access. The existence of cloud computing and cloud data storage have been predecessor and conciliator of emergence of Big Data computing. This article highlights open issues related to traditional techniques of Big Data privacy and security. Moreover, it also illustrates a comprehensive overview of possible security techniques and future directions addressing Big Data privacy and security issues.


Sign in / Sign up

Export Citation Format

Share Document