Enhanced Protection of Ecommerce Users' Personal Data and Privacy using the Trusted Third Party Model

被引:0
|
作者
Kangwa, Mukuka [1 ]
Lubobya, Charles S. [1 ]
Phiri, Jackson [2 ]
机构
[1] Univ Zambia, Dept Elect Engn, Lusaka, Zambia
[2] Univ Zambia, Dept Comp Sci, Lusaka, Zambia
关键词
Personally Identifiable Information; Data Privacy; Electronic Services; Data Protection; Random Electronic Identity; Hardware and Software;
D O I
10.5220/0010576201160126
中图分类号
F [经济];
学科分类号
02 ;
摘要
The rapid adoption of electronic delivery of services by various electronic service providers such as ecommerce and e-governance services leaves the users of these services with no option but to adapt if they are to continue accessing their desired services. To access these services, very often one has to reveal some of their personal data in order to get registered on the platforms made available courtesy of the service providers. One person is likely to surrender their personal identifying data to several service providers hence making their aggregated data susceptible to leakage online. Despite several solutions already in use data leakage is still prevalent. Our research proposes and tests a method that aggregates personal identifying data and seeks to enhance its protection from leakage using a novel approach formulated from software and hardware. This paper outlines the design and explains in detail how the approach is expected to protect data. It further gives details of the results that were obtained from experiments conducted on the constructed key component of the proposed solution.
引用
收藏
页码:116 / 126
页数:11
相关论文
共 50 条
  • [41] Data privacy protection in multi-party clustering
    Yang, Weijia
    Huang, Shangteng
    DATA & KNOWLEDGE ENGINEERING, 2008, 67 (01) : 185 - 199
  • [42] Publication of lectures and students personal data and personal privacy. the protection of personal data in the university
    Troncoso Reigada, Antonio
    REVISTA DE DERECHO POLITICO, 2006, (67): : 79 - 163
  • [43] A Novel Database Watermarking Technique Using Blockchain as Trusted Third Party
    Alghamdi, Ahmed S.
    Naz, Surayya
    Saeed, Ammar
    Al Solami, Eesa
    Kamran, Muhammad
    Alkatheiri, Mohammed Saeed
    CMC-COMPUTERS MATERIALS & CONTINUA, 2022, 70 (01): : 1585 - 1601
  • [44] A Review of Approaches to Achieve Data Storage Correctness in Cloud Computing Using Trusted Third Party Auditor
    Patel, Hiren
    Patel, Dhiren
    2012 INTERNATIONAL SYMPOSIUM ON CLOUD AND SERVICES COMPUTING (ISCOS 2012), 2012, : 84 - 87
  • [45] Secure key exchange protocol using graph and trusted third party
    Deshmukh, Maroti
    Rawat, Arjun Singh
    INTERNATIONAL JOURNAL OF COMMUNICATION NETWORKS AND DISTRIBUTED SYSTEMS, 2024, 30 (04) : 393 - 412
  • [46] Data possession audit with an implicit trusted third-party for cloud storage
    National Engineering Laboratory for Disaster Backup and Recovery, Beijing University of Posts and Telecommunications, Beijing 100876, China
    不详
    Harbin Gongcheng Daxue Xuebao, 2012, 8 (1039-1045):
  • [47] Usability enhanced privacy protection system based on users' responses
    Ko, Han-Gyu
    Kim, Seung-Hyun
    Jin, Seung-Hun
    2007 IEEE INTERNATIONAL SYMPOSIUM ON CONSUMER ELECTRONICS, VOLS 1 AND 2, 2007, : 403 - 408
  • [48] DaSCE: Data Security for Cloud Environment with Semi-Trusted Third Party
    Ali, Mazhar
    Malik, Saif U. R.
    Khan, Samee U.
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2017, 5 (04) : 642 - 655
  • [49] Challenges of the digital age for privacy and personal data protection
    Romansky, Radi P.
    Noninska, Irina S.
    MATHEMATICAL BIOSCIENCES AND ENGINEERING, 2020, 17 (05) : 5288 - 5303
  • [50] Data protection: balancing personal privacy and public health
    不详
    LANCET RESPIRATORY MEDICINE, 2016, 4 (01): : 1 - 1