An extensive review of data security infrastructure and legislature
The last few decades have witnessed technology progress with leaps and bounds leading to the creation and global adoption of different types of digital devices and platforms that can make personalized recommendations to an individual. One of the consequences of the ubiquity of these devices is the d...
Gespeichert in:
Veröffentlicht in: | Security and privacy 2022-01, Vol.5 (1), p.n/a |
---|---|
Hauptverfasser: | , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | n/a |
---|---|
container_issue | 1 |
container_start_page | |
container_title | Security and privacy |
container_volume | 5 |
creator | Bhavnani, Harshit Bardia, Shreyansh Modi, Aniket Shah, Ujwal |
description | The last few decades have witnessed technology progress with leaps and bounds leading to the creation and global adoption of different types of digital devices and platforms that can make personalized recommendations to an individual. One of the consequences of the ubiquity of these devices is the daily generation of data in large quantities. This data includes the sensitive data of an individual as well as multinational organizations and therefore, it must be always kept confidential to prevent its theft and misuse by malicious parties. However, the large volumes of data generated make it difficult to create a robust security solution to safeguard the data from different types of cyberattacks. The paper contributes to the data security industry by consolidating numerous data security algorithms that change with the infrastructure that the data is amid and also outlines the regulations surrounding it. This review paper also aims to highlight the benefits and drawbacks of the security algorithms proposed by researchers to encourage further discussion and consideration of the algorithms for their potential implementation in appropriate domains and also inspire them to develop more powerful and robust security algorithms to cover the drawbacks of the existing ones. |
doi_str_mv | 10.1002/spy2.189 |
format | Article |
fullrecord | <record><control><sourceid>wiley_cross</sourceid><recordid>TN_cdi_crossref_primary_10_1002_spy2_189</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>SPY2189</sourcerecordid><originalsourceid>FETCH-LOGICAL-c1569-c2fb0a25a37a105dd7e6a21313f8e2d98dee5aa79b9fb46811d4313a46a9d7c23</originalsourceid><addsrcrecordid>eNp1j89LwzAYhoMoOObAPyFHL51J2jTJcQx_DAYK6sFT-Np8kUjtRtJu9r-3ZR68ePrej_fhhYeQa86WnDFxm_aDWHJtzshMFEpmpRLy_E--JIuUPhljXJe5MHpG1quW4neHbQoHpBEPAY9056mDDmjCuo-hG2hofYTUxb7u-ogUWkcb_Aipgem_IhcemoSL3zsnb_d3r-vHbPv0sFmvtlnNZWmyWviKgZCQK-BMOqewBMFznnuNwhntECWAMpXxVVFqzl0xllCUYJyqRT4nN6fdOu5SiujtPoYviIPlzE7-dvK3o_-IZif0GBoc_uXsy_O7mPgfq4BdJw</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype></control><display><type>article</type><title>An extensive review of data security infrastructure and legislature</title><source>Wiley Online Library All Journals</source><creator>Bhavnani, Harshit ; Bardia, Shreyansh ; Modi, Aniket ; Shah, Ujwal</creator><creatorcontrib>Bhavnani, Harshit ; Bardia, Shreyansh ; Modi, Aniket ; Shah, Ujwal</creatorcontrib><description>The last few decades have witnessed technology progress with leaps and bounds leading to the creation and global adoption of different types of digital devices and platforms that can make personalized recommendations to an individual. One of the consequences of the ubiquity of these devices is the daily generation of data in large quantities. This data includes the sensitive data of an individual as well as multinational organizations and therefore, it must be always kept confidential to prevent its theft and misuse by malicious parties. However, the large volumes of data generated make it difficult to create a robust security solution to safeguard the data from different types of cyberattacks. The paper contributes to the data security industry by consolidating numerous data security algorithms that change with the infrastructure that the data is amid and also outlines the regulations surrounding it. This review paper also aims to highlight the benefits and drawbacks of the security algorithms proposed by researchers to encourage further discussion and consideration of the algorithms for their potential implementation in appropriate domains and also inspire them to develop more powerful and robust security algorithms to cover the drawbacks of the existing ones.</description><identifier>ISSN: 2475-6725</identifier><identifier>EISSN: 2475-6725</identifier><identifier>DOI: 10.1002/spy2.189</identifier><language>eng</language><publisher>Boston, USA: Wiley Periodicals, Inc</publisher><subject>big data ; cloud computing ; consent ; data ; data privacy ; personal information ; public data</subject><ispartof>Security and privacy, 2022-01, Vol.5 (1), p.n/a</ispartof><rights>2021 John Wiley & Sons Ltd.</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><cites>FETCH-LOGICAL-c1569-c2fb0a25a37a105dd7e6a21313f8e2d98dee5aa79b9fb46811d4313a46a9d7c23</cites><orcidid>0000-0003-2223-4791 ; 0000-0001-8212-9980 ; 0000-0001-9978-2396 ; 0000-0002-8663-3508</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://onlinelibrary.wiley.com/doi/pdf/10.1002%2Fspy2.189$$EPDF$$P50$$Gwiley$$H</linktopdf><linktohtml>$$Uhttps://onlinelibrary.wiley.com/doi/full/10.1002%2Fspy2.189$$EHTML$$P50$$Gwiley$$H</linktohtml><link.rule.ids>314,780,784,1417,27924,27925,45574,45575</link.rule.ids></links><search><creatorcontrib>Bhavnani, Harshit</creatorcontrib><creatorcontrib>Bardia, Shreyansh</creatorcontrib><creatorcontrib>Modi, Aniket</creatorcontrib><creatorcontrib>Shah, Ujwal</creatorcontrib><title>An extensive review of data security infrastructure and legislature</title><title>Security and privacy</title><description>The last few decades have witnessed technology progress with leaps and bounds leading to the creation and global adoption of different types of digital devices and platforms that can make personalized recommendations to an individual. One of the consequences of the ubiquity of these devices is the daily generation of data in large quantities. This data includes the sensitive data of an individual as well as multinational organizations and therefore, it must be always kept confidential to prevent its theft and misuse by malicious parties. However, the large volumes of data generated make it difficult to create a robust security solution to safeguard the data from different types of cyberattacks. The paper contributes to the data security industry by consolidating numerous data security algorithms that change with the infrastructure that the data is amid and also outlines the regulations surrounding it. This review paper also aims to highlight the benefits and drawbacks of the security algorithms proposed by researchers to encourage further discussion and consideration of the algorithms for their potential implementation in appropriate domains and also inspire them to develop more powerful and robust security algorithms to cover the drawbacks of the existing ones.</description><subject>big data</subject><subject>cloud computing</subject><subject>consent</subject><subject>data</subject><subject>data privacy</subject><subject>personal information</subject><subject>public data</subject><issn>2475-6725</issn><issn>2475-6725</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2022</creationdate><recordtype>article</recordtype><recordid>eNp1j89LwzAYhoMoOObAPyFHL51J2jTJcQx_DAYK6sFT-Np8kUjtRtJu9r-3ZR68ePrej_fhhYeQa86WnDFxm_aDWHJtzshMFEpmpRLy_E--JIuUPhljXJe5MHpG1quW4neHbQoHpBEPAY9056mDDmjCuo-hG2hofYTUxb7u-ogUWkcb_Aipgem_IhcemoSL3zsnb_d3r-vHbPv0sFmvtlnNZWmyWviKgZCQK-BMOqewBMFznnuNwhntECWAMpXxVVFqzl0xllCUYJyqRT4nN6fdOu5SiujtPoYviIPlzE7-dvK3o_-IZif0GBoc_uXsy_O7mPgfq4BdJw</recordid><startdate>202201</startdate><enddate>202201</enddate><creator>Bhavnani, Harshit</creator><creator>Bardia, Shreyansh</creator><creator>Modi, Aniket</creator><creator>Shah, Ujwal</creator><general>Wiley Periodicals, Inc</general><scope>AAYXX</scope><scope>CITATION</scope><orcidid>https://orcid.org/0000-0003-2223-4791</orcidid><orcidid>https://orcid.org/0000-0001-8212-9980</orcidid><orcidid>https://orcid.org/0000-0001-9978-2396</orcidid><orcidid>https://orcid.org/0000-0002-8663-3508</orcidid></search><sort><creationdate>202201</creationdate><title>An extensive review of data security infrastructure and legislature</title><author>Bhavnani, Harshit ; Bardia, Shreyansh ; Modi, Aniket ; Shah, Ujwal</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c1569-c2fb0a25a37a105dd7e6a21313f8e2d98dee5aa79b9fb46811d4313a46a9d7c23</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2022</creationdate><topic>big data</topic><topic>cloud computing</topic><topic>consent</topic><topic>data</topic><topic>data privacy</topic><topic>personal information</topic><topic>public data</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Bhavnani, Harshit</creatorcontrib><creatorcontrib>Bardia, Shreyansh</creatorcontrib><creatorcontrib>Modi, Aniket</creatorcontrib><creatorcontrib>Shah, Ujwal</creatorcontrib><collection>CrossRef</collection><jtitle>Security and privacy</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Bhavnani, Harshit</au><au>Bardia, Shreyansh</au><au>Modi, Aniket</au><au>Shah, Ujwal</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>An extensive review of data security infrastructure and legislature</atitle><jtitle>Security and privacy</jtitle><date>2022-01</date><risdate>2022</risdate><volume>5</volume><issue>1</issue><epage>n/a</epage><issn>2475-6725</issn><eissn>2475-6725</eissn><abstract>The last few decades have witnessed technology progress with leaps and bounds leading to the creation and global adoption of different types of digital devices and platforms that can make personalized recommendations to an individual. One of the consequences of the ubiquity of these devices is the daily generation of data in large quantities. This data includes the sensitive data of an individual as well as multinational organizations and therefore, it must be always kept confidential to prevent its theft and misuse by malicious parties. However, the large volumes of data generated make it difficult to create a robust security solution to safeguard the data from different types of cyberattacks. The paper contributes to the data security industry by consolidating numerous data security algorithms that change with the infrastructure that the data is amid and also outlines the regulations surrounding it. This review paper also aims to highlight the benefits and drawbacks of the security algorithms proposed by researchers to encourage further discussion and consideration of the algorithms for their potential implementation in appropriate domains and also inspire them to develop more powerful and robust security algorithms to cover the drawbacks of the existing ones.</abstract><cop>Boston, USA</cop><pub>Wiley Periodicals, Inc</pub><doi>10.1002/spy2.189</doi><tpages>29</tpages><orcidid>https://orcid.org/0000-0003-2223-4791</orcidid><orcidid>https://orcid.org/0000-0001-8212-9980</orcidid><orcidid>https://orcid.org/0000-0001-9978-2396</orcidid><orcidid>https://orcid.org/0000-0002-8663-3508</orcidid></addata></record> |
fulltext | fulltext |
identifier | ISSN: 2475-6725 |
ispartof | Security and privacy, 2022-01, Vol.5 (1), p.n/a |
issn | 2475-6725 2475-6725 |
language | eng |
recordid | cdi_crossref_primary_10_1002_spy2_189 |
source | Wiley Online Library All Journals |
subjects | big data cloud computing consent data data privacy personal information public data |
title | An extensive review of data security infrastructure and legislature |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-07T01%3A09%3A30IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-wiley_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=An%20extensive%20review%20of%20data%20security%20infrastructure%20and%20legislature&rft.jtitle=Security%20and%20privacy&rft.au=Bhavnani,%20Harshit&rft.date=2022-01&rft.volume=5&rft.issue=1&rft.epage=n/a&rft.issn=2475-6725&rft.eissn=2475-6725&rft_id=info:doi/10.1002/spy2.189&rft_dat=%3Cwiley_cross%3ESPY2189%3C/wiley_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true |