An extensive review of data security infrastructure and legislature

The last few decades have witnessed technology progress with leaps and bounds leading to the creation and global adoption of different types of digital devices and platforms that can make personalized recommendations to an individual. One of the consequences of the ubiquity of these devices is the d...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Security and privacy 2022-01, Vol.5 (1), p.n/a
Hauptverfasser: Bhavnani, Harshit, Bardia, Shreyansh, Modi, Aniket, Shah, Ujwal
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page n/a
container_issue 1
container_start_page
container_title Security and privacy
container_volume 5
creator Bhavnani, Harshit
Bardia, Shreyansh
Modi, Aniket
Shah, Ujwal
description The last few decades have witnessed technology progress with leaps and bounds leading to the creation and global adoption of different types of digital devices and platforms that can make personalized recommendations to an individual. One of the consequences of the ubiquity of these devices is the daily generation of data in large quantities. This data includes the sensitive data of an individual as well as multinational organizations and therefore, it must be always kept confidential to prevent its theft and misuse by malicious parties. However, the large volumes of data generated make it difficult to create a robust security solution to safeguard the data from different types of cyberattacks. The paper contributes to the data security industry by consolidating numerous data security algorithms that change with the infrastructure that the data is amid and also outlines the regulations surrounding it. This review paper also aims to highlight the benefits and drawbacks of the security algorithms proposed by researchers to encourage further discussion and consideration of the algorithms for their potential implementation in appropriate domains and also inspire them to develop more powerful and robust security algorithms to cover the drawbacks of the existing ones.
doi_str_mv 10.1002/spy2.189
format Article
fullrecord <record><control><sourceid>wiley_cross</sourceid><recordid>TN_cdi_crossref_primary_10_1002_spy2_189</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>SPY2189</sourcerecordid><originalsourceid>FETCH-LOGICAL-c1569-c2fb0a25a37a105dd7e6a21313f8e2d98dee5aa79b9fb46811d4313a46a9d7c23</originalsourceid><addsrcrecordid>eNp1j89LwzAYhoMoOObAPyFHL51J2jTJcQx_DAYK6sFT-Np8kUjtRtJu9r-3ZR68ePrej_fhhYeQa86WnDFxm_aDWHJtzshMFEpmpRLy_E--JIuUPhljXJe5MHpG1quW4neHbQoHpBEPAY9056mDDmjCuo-hG2hofYTUxb7u-ogUWkcb_Aipgem_IhcemoSL3zsnb_d3r-vHbPv0sFmvtlnNZWmyWviKgZCQK-BMOqewBMFznnuNwhntECWAMpXxVVFqzl0xllCUYJyqRT4nN6fdOu5SiujtPoYviIPlzE7-dvK3o_-IZif0GBoc_uXsy_O7mPgfq4BdJw</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype></control><display><type>article</type><title>An extensive review of data security infrastructure and legislature</title><source>Wiley Online Library All Journals</source><creator>Bhavnani, Harshit ; Bardia, Shreyansh ; Modi, Aniket ; Shah, Ujwal</creator><creatorcontrib>Bhavnani, Harshit ; Bardia, Shreyansh ; Modi, Aniket ; Shah, Ujwal</creatorcontrib><description>The last few decades have witnessed technology progress with leaps and bounds leading to the creation and global adoption of different types of digital devices and platforms that can make personalized recommendations to an individual. One of the consequences of the ubiquity of these devices is the daily generation of data in large quantities. This data includes the sensitive data of an individual as well as multinational organizations and therefore, it must be always kept confidential to prevent its theft and misuse by malicious parties. However, the large volumes of data generated make it difficult to create a robust security solution to safeguard the data from different types of cyberattacks. The paper contributes to the data security industry by consolidating numerous data security algorithms that change with the infrastructure that the data is amid and also outlines the regulations surrounding it. This review paper also aims to highlight the benefits and drawbacks of the security algorithms proposed by researchers to encourage further discussion and consideration of the algorithms for their potential implementation in appropriate domains and also inspire them to develop more powerful and robust security algorithms to cover the drawbacks of the existing ones.</description><identifier>ISSN: 2475-6725</identifier><identifier>EISSN: 2475-6725</identifier><identifier>DOI: 10.1002/spy2.189</identifier><language>eng</language><publisher>Boston, USA: Wiley Periodicals, Inc</publisher><subject>big data ; cloud computing ; consent ; data ; data privacy ; personal information ; public data</subject><ispartof>Security and privacy, 2022-01, Vol.5 (1), p.n/a</ispartof><rights>2021 John Wiley &amp; Sons Ltd.</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><cites>FETCH-LOGICAL-c1569-c2fb0a25a37a105dd7e6a21313f8e2d98dee5aa79b9fb46811d4313a46a9d7c23</cites><orcidid>0000-0003-2223-4791 ; 0000-0001-8212-9980 ; 0000-0001-9978-2396 ; 0000-0002-8663-3508</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktopdf>$$Uhttps://onlinelibrary.wiley.com/doi/pdf/10.1002%2Fspy2.189$$EPDF$$P50$$Gwiley$$H</linktopdf><linktohtml>$$Uhttps://onlinelibrary.wiley.com/doi/full/10.1002%2Fspy2.189$$EHTML$$P50$$Gwiley$$H</linktohtml><link.rule.ids>314,780,784,1417,27924,27925,45574,45575</link.rule.ids></links><search><creatorcontrib>Bhavnani, Harshit</creatorcontrib><creatorcontrib>Bardia, Shreyansh</creatorcontrib><creatorcontrib>Modi, Aniket</creatorcontrib><creatorcontrib>Shah, Ujwal</creatorcontrib><title>An extensive review of data security infrastructure and legislature</title><title>Security and privacy</title><description>The last few decades have witnessed technology progress with leaps and bounds leading to the creation and global adoption of different types of digital devices and platforms that can make personalized recommendations to an individual. One of the consequences of the ubiquity of these devices is the daily generation of data in large quantities. This data includes the sensitive data of an individual as well as multinational organizations and therefore, it must be always kept confidential to prevent its theft and misuse by malicious parties. However, the large volumes of data generated make it difficult to create a robust security solution to safeguard the data from different types of cyberattacks. The paper contributes to the data security industry by consolidating numerous data security algorithms that change with the infrastructure that the data is amid and also outlines the regulations surrounding it. This review paper also aims to highlight the benefits and drawbacks of the security algorithms proposed by researchers to encourage further discussion and consideration of the algorithms for their potential implementation in appropriate domains and also inspire them to develop more powerful and robust security algorithms to cover the drawbacks of the existing ones.</description><subject>big data</subject><subject>cloud computing</subject><subject>consent</subject><subject>data</subject><subject>data privacy</subject><subject>personal information</subject><subject>public data</subject><issn>2475-6725</issn><issn>2475-6725</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2022</creationdate><recordtype>article</recordtype><recordid>eNp1j89LwzAYhoMoOObAPyFHL51J2jTJcQx_DAYK6sFT-Np8kUjtRtJu9r-3ZR68ePrej_fhhYeQa86WnDFxm_aDWHJtzshMFEpmpRLy_E--JIuUPhljXJe5MHpG1quW4neHbQoHpBEPAY9056mDDmjCuo-hG2hofYTUxb7u-ogUWkcb_Aipgem_IhcemoSL3zsnb_d3r-vHbPv0sFmvtlnNZWmyWviKgZCQK-BMOqewBMFznnuNwhntECWAMpXxVVFqzl0xllCUYJyqRT4nN6fdOu5SiujtPoYviIPlzE7-dvK3o_-IZif0GBoc_uXsy_O7mPgfq4BdJw</recordid><startdate>202201</startdate><enddate>202201</enddate><creator>Bhavnani, Harshit</creator><creator>Bardia, Shreyansh</creator><creator>Modi, Aniket</creator><creator>Shah, Ujwal</creator><general>Wiley Periodicals, Inc</general><scope>AAYXX</scope><scope>CITATION</scope><orcidid>https://orcid.org/0000-0003-2223-4791</orcidid><orcidid>https://orcid.org/0000-0001-8212-9980</orcidid><orcidid>https://orcid.org/0000-0001-9978-2396</orcidid><orcidid>https://orcid.org/0000-0002-8663-3508</orcidid></search><sort><creationdate>202201</creationdate><title>An extensive review of data security infrastructure and legislature</title><author>Bhavnani, Harshit ; Bardia, Shreyansh ; Modi, Aniket ; Shah, Ujwal</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c1569-c2fb0a25a37a105dd7e6a21313f8e2d98dee5aa79b9fb46811d4313a46a9d7c23</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2022</creationdate><topic>big data</topic><topic>cloud computing</topic><topic>consent</topic><topic>data</topic><topic>data privacy</topic><topic>personal information</topic><topic>public data</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Bhavnani, Harshit</creatorcontrib><creatorcontrib>Bardia, Shreyansh</creatorcontrib><creatorcontrib>Modi, Aniket</creatorcontrib><creatorcontrib>Shah, Ujwal</creatorcontrib><collection>CrossRef</collection><jtitle>Security and privacy</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Bhavnani, Harshit</au><au>Bardia, Shreyansh</au><au>Modi, Aniket</au><au>Shah, Ujwal</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>An extensive review of data security infrastructure and legislature</atitle><jtitle>Security and privacy</jtitle><date>2022-01</date><risdate>2022</risdate><volume>5</volume><issue>1</issue><epage>n/a</epage><issn>2475-6725</issn><eissn>2475-6725</eissn><abstract>The last few decades have witnessed technology progress with leaps and bounds leading to the creation and global adoption of different types of digital devices and platforms that can make personalized recommendations to an individual. One of the consequences of the ubiquity of these devices is the daily generation of data in large quantities. This data includes the sensitive data of an individual as well as multinational organizations and therefore, it must be always kept confidential to prevent its theft and misuse by malicious parties. However, the large volumes of data generated make it difficult to create a robust security solution to safeguard the data from different types of cyberattacks. The paper contributes to the data security industry by consolidating numerous data security algorithms that change with the infrastructure that the data is amid and also outlines the regulations surrounding it. This review paper also aims to highlight the benefits and drawbacks of the security algorithms proposed by researchers to encourage further discussion and consideration of the algorithms for their potential implementation in appropriate domains and also inspire them to develop more powerful and robust security algorithms to cover the drawbacks of the existing ones.</abstract><cop>Boston, USA</cop><pub>Wiley Periodicals, Inc</pub><doi>10.1002/spy2.189</doi><tpages>29</tpages><orcidid>https://orcid.org/0000-0003-2223-4791</orcidid><orcidid>https://orcid.org/0000-0001-8212-9980</orcidid><orcidid>https://orcid.org/0000-0001-9978-2396</orcidid><orcidid>https://orcid.org/0000-0002-8663-3508</orcidid></addata></record>
fulltext fulltext
identifier ISSN: 2475-6725
ispartof Security and privacy, 2022-01, Vol.5 (1), p.n/a
issn 2475-6725
2475-6725
language eng
recordid cdi_crossref_primary_10_1002_spy2_189
source Wiley Online Library All Journals
subjects big data
cloud computing
consent
data
data privacy
personal information
public data
title An extensive review of data security infrastructure and legislature
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-07T01%3A09%3A30IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-wiley_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=An%20extensive%20review%20of%20data%20security%20infrastructure%20and%20legislature&rft.jtitle=Security%20and%20privacy&rft.au=Bhavnani,%20Harshit&rft.date=2022-01&rft.volume=5&rft.issue=1&rft.epage=n/a&rft.issn=2475-6725&rft.eissn=2475-6725&rft_id=info:doi/10.1002/spy2.189&rft_dat=%3Cwiley_cross%3ESPY2189%3C/wiley_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rfr_iscdi=true