Securing Personally Identifiable Information: A Survey of SOTA Techniques, and a Way Forward

被引:0
|
作者
Makhdoom, Imran [1 ]
Abolhasan, Mehran [1 ]
Lipman, Justin [1 ]
Shariati, Negin [1 ]
Franklin, Daniel [1 ]
Piccardi, Massimo [1 ]
机构
[1] Univ Technol Sydney, Fac Engn & IT, Ultimo, NSW 2007, Australia
来源
IEEE ACCESS | 2024年 / 12卷
关键词
Identification of persons; Security; Privacy; Regulation; Internet of Things; General Data Protection Regulation; Data privacy; security and privacy; data sharing; regulations and policies; privacy-preserving computation; personally identifiable information; PRIVACY; ANONYMIZATION;
D O I
10.1109/ACCESS.2024.3447017
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The current age is witnessing an unprecedented dependence on data originating from humans through the devices that comprise the Internet of Things. The data collected by these devices are used for many purposes, including predictive maintenance, smart analytics, preventive healthcare, disaster protection, and increased operational efficiency and performance. However, most applications and systems that rely on user data to achieve their business objectives fail to comply with privacy regulations and expose users to numerous privacy threats. Such privacy breaches raise concerns about the legitimacy of the data being processed. Hence, this paper reviews some notable techniques for transparently, securely, and privately separating and sharing personally identifiable and non-personally identifiable information in various domains. One of the key findings of this study is that, despite various advantages, none of the existing techniques or data sharing applications preserve data/user privacy throughout the data life cycle. Another significant issue is the lack of transparency for data subjects during the collection, storage, and processing of private data. In addition, as privacy is unique to every user, there cannot be a single autonomous solution to identify and secure personally identifiable information for users of a particular application, system, or people living in different states/countries. Therefore, this research suggests a way forward to prevent the leakage of personally identifiable information at various stages of the data life cycle in compliance with some of the common privacy regulations around the world. The proposed approach aims to empower data owners to select, share, monitor, and control access to their data. In addition, the data owner is a stakeholder and a party to all data sharing contracts related to his personal data. The proposed solution has broad security and privacy controls that can be tailored to the privacy needs of specific applications.
引用
收藏
页码:116740 / 116770
页数:31
相关论文
共 50 条
  • [1] Securing Personally Identifiable Information (PII) in Personal Financial Statements
    Hamilton, George
    Williams, Medina
    Khan, Tahir M.
    [J]. ADVANCES IN INFORMATION AND COMMUNICATION, FICC, VOL 2, 2023, 652 : 709 - 728
  • [2] Myths and Fallacies of "Personally Identifiable Information"
    Narayanan, Arvind
    Shmatikov, Vitaly
    [J]. COMMUNICATIONS OF THE ACM, 2010, 53 (06) : 24 - 26
  • [3] Checking Questionable Entry of Personally Identifiable Information Encrypted by One-Way Hash Transformation
    Chen, Xianlai
    Fann, Yang C.
    McAuliffe, Matthew
    Vismer, David
    Yang, Rong
    [J]. JMIR MEDICAL INFORMATICS, 2017, 5 (01):
  • [4] Analyzing Leakage of Personally Identifiable Information in Language Models
    Lukas, Nils
    Salem, Ahmed
    Sim, Robert
    Tople, Shruti
    Wutschitz, Lukas
    Zanella-Beguelin, Santiago
    [J]. 2023 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, SP, 2023, : 346 - 363
  • [5] PIITracker: Automatic Tracking of Personally Identifiable Information in Windows
    Arefi, Meisam Navaki
    Alexander, Geoffrey
    Crandall, Jedidiah R.
    [J]. PROCEEDINGS OF THE 11TH EUROPEAN WORKSHOP ON SYSTEMS SECURITY (EUROSEC 2018), 2018,
  • [6] On the Leakage of Personally Identifiable Information Via Online Social Networks
    Krishnamurthy, Balachander
    Wills, Craig E.
    [J]. 2ND ACM SIGCOMM WORKSHOP ON ONLINE SOCIAL NETWORKS (WOSN 09), 2009, : 7 - 12
  • [7] On the Leakage of Personally Identifiable Information Via Online Social Networks
    Krishnamurthy, Balachander
    Wills, Craig E.
    [J]. ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2010, 40 (01) : 112 - 117
  • [8] THE PII PROBLEM: PRIVACY AND A NEW CONCEPT OF PERSONALLY IDENTIFIABLE INFORMATION
    Schwartz, Paul M.
    Solove, Daniel J.
    [J]. NEW YORK UNIVERSITY LAW REVIEW, 2011, 86 (06) : 1814 - 1894
  • [9] Analysis and Nudging of Personally Identifiable Information in Online Used Markets
    Mun, Hyunsu
    Lee, Youngseok
    [J]. 2019 FIRST IEEE INTERNATIONAL CONFERENCE ON TRUST, PRIVACY AND SECURITY IN INTELLIGENT SYSTEMS AND APPLICATIONS (TPS-ISA 2019), 2019, : 120 - 129
  • [10] The Disclosure of Personally Identifiable Information in Studies of Neighborhood Contexts and Patient Outcomes
    Rundle, Andrew Graham
    Bader, Michael David Miller
    Mooney, Stephen John
    [J]. JOURNAL OF MEDICAL INTERNET RESEARCH, 2022, 24 (03)