Enhanced Protection of Ecommerce Users' Personal Data and Privacy using the Trusted Third Party Model

被引:0
|
作者
Kangwa, Mukuka [1 ]
Lubobya, Charles S. [1 ]
Phiri, Jackson [2 ]
机构
[1] Univ Zambia, Dept Elect Engn, Lusaka, Zambia
[2] Univ Zambia, Dept Comp Sci, Lusaka, Zambia
关键词
Personally Identifiable Information; Data Privacy; Electronic Services; Data Protection; Random Electronic Identity; Hardware and Software;
D O I
10.5220/0010576201160126
中图分类号
F [经济];
学科分类号
02 ;
摘要
The rapid adoption of electronic delivery of services by various electronic service providers such as ecommerce and e-governance services leaves the users of these services with no option but to adapt if they are to continue accessing their desired services. To access these services, very often one has to reveal some of their personal data in order to get registered on the platforms made available courtesy of the service providers. One person is likely to surrender their personal identifying data to several service providers hence making their aggregated data susceptible to leakage online. Despite several solutions already in use data leakage is still prevalent. Our research proposes and tests a method that aggregates personal identifying data and seeks to enhance its protection from leakage using a novel approach formulated from software and hardware. This paper outlines the design and explains in detail how the approach is expected to protect data. It further gives details of the results that were obtained from experiments conducted on the constructed key component of the proposed solution.
引用
收藏
页码:116 / 126
页数:11
相关论文
共 50 条
  • [21] Trusted Location Sharing on Enhanced Privacy-Protection IoT Without Trusted Center
    Lian, Bin
    Cui, Jialin
    Chen, Hongyuan
    Zhao, Xianghong
    Wang, Fuqun
    Chen, Kefei
    Ma, Maode
    IEEE INTERNET OF THINGS JOURNAL, 2024, 11 (07) : 12331 - 12345
  • [22] Privacy Awareness and Social Media: Personal Data Protection among Facebook** and Instagram** Users
    Peter, Dede Ibiere
    Ndinojuo, Ben-Collin Emeka
    GALACTICA MEDIA-JOURNAL OF MEDIA STUDIES - GALAKTIKA MEDIA-ZHURNAL MEDIA ISSLEDOVANIJ, 2024, 6 (03): : 168 - 198
  • [23] Data Anonymous Collection Protocol without Trusted Third Party
    Zhou Zhiping
    Li Zhicong
    JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2019, 41 (06) : 1442 - 1449
  • [24] Big Data Privacy Protection Model Based on Multi-level Trusted System
    Zhang, Nan
    Liu, Zehua
    Han, Hongfeng
    6TH INTERNATIONAL CONFERENCE ON COMPUTER-AIDED DESIGN, MANUFACTURING, MODELING AND SIMULATION (CDMMS 2018), 2018, 1967
  • [25] A Framework for User Privacy Protection Using Trusted Programs
    Takahashi, Kenichi
    Liu, Zhaoyu
    Sakurai, Kouichi
    Amamiya, Makoto
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2007, 1 (02): : 59 - 70
  • [26] DPIP: A Demand Response Privacy Preserving Interaction Protocol For Trusted Third Party Involvement
    Karwe, Markus
    Mueller, Guenter
    BUSINESS INFORMATION SYSTEMS WORKSHOPS, BIS 2015, 2015, 228 : 224 - 234
  • [27] Privacy Preserving Naive Bayes Classification Using Trusted Third Party Computation over Distributed Progressive Databases
    Keshavamurthy, B. N.
    Toshniwal, Durga
    ADVANCES IN COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, PT I, 2011, 131 : 24 - 32
  • [28] TraceMixer: Privacy-Preserving Crowd-Sensing sans Trusted Third Party
    Ziegeldorf, Jan Henrik
    Henze, Martin
    Bavendiek, Jens
    Wehrle, Klaus
    2017 13TH ANNUAL CONFERENCE ON WIRELESS ON-DEMAND NETWORK SYSTEMS AND SERVICES (WONS), 2017, : 17 - 24
  • [29] Towards an Information Privacy and Personal Data Protection Competency Model for Citizens
    Tsohou, Aggeliki
    TRUST, PRIVACY AND SECURITY IN DIGITAL BUSINESS (TRUSTBUS 2021), 2021, 12927 : 112 - 125
  • [30] Quantum protection scheme for privacy data based on trusted center
    Wen, Xiaojun
    Chen, Yongzhi
    Zhang, Wei
    Zoe, L. Jiang
    Fang, Junbin
    OPTICS AND LASER TECHNOLOGY, 2024, 169