Redirigiendo al acceso original de articulo en 21 segundos...
Inicio  /  Future Internet  /  Vol: 14 Par: 11 (2022)  /  Artículo
ARTÍCULO
TITULO

Protecting Sensitive Data in the Information Age: State of the Art and Future Prospects

Christoph Stach    
Clémentine Gritti    
Julia Bräcker    
Michael Behringer and Bernhard Mitschang    

Resumen

The present information age is characterized by an ever-increasing digitalization. Smart devices quantify our entire lives. These collected data provide the foundation for data-driven services called smart services. They are able to adapt to a given context and thus tailor their functionalities to the user?s needs. It is therefore not surprising that their main resource, namely data, is nowadays a valuable commodity that can also be traded. However, this trend does not only have positive sides, as the gathered data reveal a lot of information about various data subjects. To prevent uncontrolled insights into private or confidential matters, data protection laws restrict the processing of sensitive data. One key factor in this regard is user-friendly privacy mechanisms. In this paper, we therefore assess current state-of-the-art privacy mechanisms. To this end, we initially identify forms of data processing applied by smart services. We then discuss privacy mechanisms suited for these use cases. Our findings reveal that current state-of-the-art privacy mechanisms provide good protection in principle, but there is no compelling one-size-fits-all privacy approach. This leads to further questions regarding the practicality of these mechanisms, which we present in the form of seven thought-provoking propositions.

 Artículos similares

       
 
Tianyu Bai, Song Fu and Qing Yang    
With the wider adoption of edge computing services, intelligent edge devices, and high-speed V2X communication, compute-intensive tasks for autonomous vehicles, such as object detection using camera, LiDAR, and/or radar data, can be partially offloaded t... ver más
Revista: Future Internet

 
Juan Wang, Yang Yu, Yi Li, Chengyang Fan and Shirong Hao    
Network function virtualization (NFV) provides flexible and scalable network function for the emerging platform, such as the cloud computing, edge computing, and IoT platforms, while it faces more security challenges, such as tampering with network polic... ver más
Revista: Future Internet

 
Gabriel Pardo Redondo, Giovanna Franco, Antroula Georgiou, Ioannis Ioannou, Barbara Lubelli, Stefano F. Musso, Silvia Naldini, Cristiana Nunes and Rita Vecchiattini    
Historic concrete buildings are at risk. Limited knowledge of concrete technology until the 1960s led to more sensitive buildings than modern concrete buildings. In addition, the lack of sensibility regarding their heritage value and insufficient protect... ver más
Revista: Infrastructures

 
Mounir Hafsa and Farah Jemili    
Cybersecurity ventures expect that cyber-attack damage costs will rise to $11.5 billion in 2019 and that a business will fall victim to a cyber-attack every 14 seconds. Notice here that the time frame for such an event is seconds. With petabytes of data ... ver más

 
Jinyi Guo, Wei Ren, Yi Ren and Tianqing Zhu    
When large images are used for big data analysis, they impose new challenges in protecting image privacy. For example, a geographic image may consist of several sensitive areas or layers. When it is uploaded into servers, the image will be accessed by di... ver más
Revista: Future Internet