Enhanced Protection of Ecommerce Users' Personal Data and Privacy using the Trusted Third Party Model

被引:0
|
作者
Kangwa, Mukuka [1 ]
Lubobya, Charles S. [1 ]
Phiri, Jackson [2 ]
机构
[1] Univ Zambia, Dept Elect Engn, Lusaka, Zambia
[2] Univ Zambia, Dept Comp Sci, Lusaka, Zambia
关键词
Personally Identifiable Information; Data Privacy; Electronic Services; Data Protection; Random Electronic Identity; Hardware and Software;
D O I
10.5220/0010576201160126
中图分类号
F [经济];
学科分类号
02 ;
摘要
The rapid adoption of electronic delivery of services by various electronic service providers such as ecommerce and e-governance services leaves the users of these services with no option but to adapt if they are to continue accessing their desired services. To access these services, very often one has to reveal some of their personal data in order to get registered on the platforms made available courtesy of the service providers. One person is likely to surrender their personal identifying data to several service providers hence making their aggregated data susceptible to leakage online. Despite several solutions already in use data leakage is still prevalent. Our research proposes and tests a method that aggregates personal identifying data and seeks to enhance its protection from leakage using a novel approach formulated from software and hardware. This paper outlines the design and explains in detail how the approach is expected to protect data. It further gives details of the results that were obtained from experiments conducted on the constructed key component of the proposed solution.
引用
收藏
页码:116 / 126
页数:11
相关论文
共 50 条
  • [1] Location Privacy Protection Scheme Without Trusted Third Party
    Zhang, Mingyue
    Jin, Tong
    Wang, Guohong
    Wang, Tian
    Zhang, Gongxuan
    IEEE INTERNATIONAL CONFERENCE ON RECENT ADVANCES IN SYSTEMS SCIENCE AND ENGINEERING (IEEE RASSE 2021), 2021,
  • [2] Privacy-Preserving Data Analysis without Trusted Third Party
    Miyaji, Atsuko
    Takahashi, Tomoka
    Wang, Ping-Lun
    Yamatsuki, Tatsuhiro
    Mimoto, Tomoaki
    2022 IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS, TRUSTCOM, 2022, : 710 - 717
  • [3] Brief Announcement: Privacy Preserving Mining of Distributed Data Using a Trusted and Partitioned Third Party
    Maoz, Nir
    Gudes, Ehud
    CYBER SECURITY CRYPTOGRAPHY AND MACHINE LEARNING (CSCML 2017), 2017, 10332 : 193 - 195
  • [4] A vehicular ad hoc network privacy protection scheme without a trusted third party
    Wang, Xiaoliang
    Li, Shuifan
    Zhao, Shujing
    Xia, Zhihua
    Bai, Liang
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2017, 13 (12):
  • [5] Measuring Personal Privacy Breaches Using Third-Party Trackers
    Shuford, Erica
    Kavanaugh, Tara
    Ralph, Brian
    Ceesay, Ebrima
    Watters, Paul A.
    2018 17TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (IEEE TRUSTCOM) / 12TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING (IEEE BIGDATASE), 2018, : 1615 - 1618
  • [6] A NOVEL SECURITY MODEL FOR CLOUD USING TRUSTED THIRD PARTY ENCRYPTION
    Thamizhselvan, M.
    Raghuraman, R.
    Manoj, S. Gershon
    Paul, P. Victer
    2015 INTERNATIONAL CONFERENCE ON INNOVATIONS IN INFORMATION, EMBEDDED AND COMMUNICATION SYSTEMS (ICIIECS), 2015,
  • [7] Privacy Protection through Open Data and Trusted Third Parties: A Plea for Public Control of Social Data
    Kinder-Kurlanda, Katharina
    ZUKUNFT DER DATENOKONOMIE: ZWISCHEN GESCHAFTSMODELL, KOLLEKTIVGUT UND VERBRAUCHERSCHUTZ, 2019, : 103 - 116
  • [8] Privacy Preserving Probabilistic Record Linkage Without Trusted Third Party
    Lazrig, Ibrahim
    Ong, Toan C.
    Ray, Indrajit
    Ray, Indrakshi
    Jiang, Xiaoqian
    Vaidya, Jaideep
    2018 16TH ANNUAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2018, : 75 - 84
  • [9] Trusted Third Party for Data Security in Cloud Environment
    Katre, Noopur
    Theng, Deepti
    PROCEEDINGS OF THE 2016 IEEE 2ND INTERNATIONAL CONFERENCE ON ADVANCES IN ELECTRICAL & ELECTRONICS, INFORMATION, COMMUNICATION & BIO INFORMATICS (IEEE AEEICB-2016), 2016, : 670 - 672
  • [10] Efficient data transmission using trusted third party in smart home environments
    Panda, Niharika
    Supriya, M.
    EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2022, 2022 (01)