Data Encryption and Anonymization Techniques for Enhanced Information System Security and Privacy

Authors

  • Arief Budi Pratomo STIE Nusa Megarkencana
  • Sabil Mokodenseho Institut Agama Islam Muhammadiyah Kotamobagu
  • Adit Mohammad Aziz Institut Agama Islam Muhammadiyah Kotamobagu

DOI:

https://doi.org/10.58812/wsist.v1i01.176

Keywords:

Data, Encryption, Anonymization, Information System, Security, Privacy

Abstract

The rapid evolution of digital technology has ushered in a new era of data-driven information systems, bringing both unprecedented convenience and complex challenges to the forefront. This research delves into the realm of data encryption and anonymization techniques to enhance the security and privacy of information systems. The study encompasses a comprehensive exploration of diverse encryption and anonymization methods, evaluating their effectiveness through qualitative and quantitative analysis. A bibliometric analysis, facilitated by VOSviewer, unveils influential authors, research trends, and collaborative networks in the field. The research sheds light on the practical implications of encryption and anonymization techniques through real-world case studies and offers insights into the multidimensional landscape of information system security and user privacy.

References

M. K. Altuev, “Method of Data Exchange between IP Video Camera and Server.” Google Patents, Apr. 2018.

L. Singh and A. Kumar, “Secured Information Retrieval from Cloud Involving OTP and Human Voice,” 2017.

M. J. Khan, “Securing network infrastructure with cyber security,” World J. Adv. Res. Rev., vol. 17, no. 2, pp. 803–813, 2023.

W. B. Tesfay, J. Serna, and K. Rannenberg, “Privacybot: detecting privacy sensitive information in unstructured texts,” in 2019 sixth international conference on social networks analysis, management and security (SNAMS), 2019, pp. 53–60.

R. Jin, X. He, and H. Dai, “On the security-privacy tradeoff in collaborative security: A quantitative information flow game perspective,” IEEE Trans. Inf. Forensics Secur., vol. 14, no. 12, pp. 3273–3286, 2019.

Q. Pan, J. Wu, A. K. Bashir, J. Li, W. Yang, and Y. D. Al-Otaibi, “Joint protection of energy security and information privacy for energy harvesting: An incentive federated learning approach,” IEEE Trans. Ind. Informatics, vol. 18, no. 5, pp. 3473–3483, 2021.

E. U. Okike and G. Mogapi, “A Pedagogic Analysis of Information Systems Security Measures in Online Services,” in 2020 15th International Conference for Internet Technology and Secured Transactions (ICITST), 2020, pp. 1–6.

J. K. Sørensen, H. Van den Bulck, and S. Kosta, “Privacy Policies Caught Between the Legal and the Ethical: European Media and Third Party Trackers Before and After GDPR,” 2019.

I. Calzada, “Citizens’ data privacy in China: The state of the art of the Personal Information Protection Law (PIPL),” Smart Cities, vol. 5, no. 3, pp. 1129–1150, 2022.

S. Kamaruddin, A. M. Mohammad, N. N. M. Saufi, W. R. W. Rosli, M. B. Othman, and Z. Hamin, “Compliance to GDPR Data Protection and Privacy in Artificial Intelligence Technology: Legal and Ethical Ramifications in Malaysia,” in 2023 International Conference on Disruptive Technologies (ICDT), 2023, pp. 284–288.

H. J. Parker and S. Flowerday, “Understanding the disclosure of personal data online,” Inf. Comput. Secur., vol. 29, no. 3, pp. 413–434, 2021.

R. Dastres and M. Soori, “A review in recent development of network threats and security measures,” Int. J. Inf. Sci. Comput. Eng., 2021.

J. Scheibner, M. Ienca, and E. Vayena, “Health data privacy through homomorphic encryption and distributed ledger computing: an ethical-legal qualitative expert assessment study,” BMC Med. Ethics, vol. 23, no. 1, pp. 1–13, 2022.

M. Goldblum et al., “Dataset security for machine learning: Data poisoning, backdoor attacks, and defenses,” IEEE Trans. Pattern Anal. Mach. Intell., vol. 45, no. 2, pp. 1563–1580, 2022.

A. Kamruzzaman, S. Ismat, J. C. Brickley, A. Liu, and K. Thakur, “A Comprehensive Review of Endpoint Security: Threats and Defenses,” in 2022 International Conference on Cyber Warfare and Security (ICCWS), 2022, pp. 1–7.

R. Kumar, “Managing Business in the Digital Era–The use of IT and Analytics for Process Transformation,” Journal of Decision Systems, vol. 30, no. 4. Taylor & Francis, pp. 410–413, 2021.

M. Bellare, A. Desai, E. Jokipii, and P. Rogaway, “A concrete security treatment of symmetric encryption,” in Proceedings 38th Annual Symposium on Foundations of Computer Science, 1997, pp. 394–403.

Q. Xu, K. Sun, and C. Zhu, “A visually secure asymmetric image encryption scheme based on RSA algorithm and hyperchaotic map,” Phys. Scr., vol. 95, no. 3, p. 35223, 2020.

C. Gentry, “Fully homomorphic encryption using ideal lattices,” in Proceedings of the forty-first annual ACM symposium on Theory of computing, 2009, pp. 169–178.

M. Idris, E. Willya, I. Wekke, and S. Mokodenseho, “Peace resolution in education and application on information and communication technologhy,” Int. J. Adv. Sci. Technol., vol. 29, no. 6, 2021.

X. Li, S. Liu, F. Wu, S. Kumari, and J. J. P. C. Rodrigues, “Privacy preserving data aggregation scheme for mobile edge computing assisted IoT applications,” IEEE Internet Things J., vol. 6, no. 3, pp. 4755–4763, 2018.

M. Kasianchuk et al., “Developing Symmetric Encryption Methods Based On Residue Number System And Investigating Their Cryptosecurity,” Cryptol. ePrint Arch., 2020.

G. K. Soni, H. Arora, and B. Jain, “A novel image encryption technique using Arnold transform and asymmetric RSA algorithm,” in International Conference on Artificial Intelligence: Advances and Applications 2019: Proceedings of ICAIAA 2019, 2020, pp. 83–90.

M. Mokobombang, Z. Darwis, and S. Mokodenseho, “Pemberantasan Tindak Pidana Cyber di Provinsi Jawa Barat: Peran Hukum dan Tantangan dalam Penegakan Hukum Terhadap Kejahatan Digital,” J. Huk. dan HAM Wara Sains, vol. 2, no. 6, pp. 517–525, 2023.

O. Vovk, G. Piho, and P. Ross, “Anonymization methods of structured health care data: A literature review,” in International Conference on Model and Data Engineering, 2021, pp. 175–189.

G. Yi and Z. Xie, “Research on the Anonymity Method Based-on kanonymity for Electronic Commerce,” in 2012 National Conference on Information Technology and Computer Science, 2012, pp. 1025–1028.

F. Ashkouti, K. Khamforoosh, A. Sheikhahmadi, and H. Khamfroush, “DHkmeans-ℓdiversity: distributed hierarchical K-means for satisfaction of the ℓ-diversity privacy model using Apache Spark,” J. Supercomput., vol. 78, no. 2, pp. 2616–2650, 2022.

A. V Bogdanov and Y. E. Gorbachev, “T approximation in the theory of a normal Fermi liquid: II. Calculation of microscopic characteristics of fermi systems,” Sov. Phys. J., vol. 20, no. 8, pp. 1011–1014, 1977.

J. Vasa and A. Thakkar, “Deep learning: Differential privacy preservation in the era of big data,” J. Comput. Inf. Syst., vol. 63, no. 3, pp. 608–631, 2023.

R. Ratra, P. Gulia, and N. S. Gill, “Evaluation of Re-identification risk using anonymization and differential privacy in healthcare,” Int. J. Adv. Comput. Sci. Appl., vol. 13, no. 2, 2022.

K. Devaki, “Re-encryption model for multi-block data updates in network security,” in 2022 International Conference on Applied Artificial Intelligence and Computing (ICAAIC), 2022, pp. 1331–1336.

K. S. Banu, V. Santhi, and B. K. Tripathy, “Non-cryptographic security to data: Distortion based anonymization techniques,” in 2014 International Conference on Advances in Engineering and Technology (ICAET), 2014, pp. 1–5.

M. C. Compagnucci, J. Meszaros, T. Minssen, A. Arasilango, T. Ous, and M. Rajarajan, “Homomorphic Encryption: The’Holy Grail’for Big Data Analytics and Legal Compliance in the Pharmaceutical and Healthcare Sector?,” EPLR, vol. 3, p. 144, 2019.

M. Bishop, “What is computer security?,” IEEE Secur. Priv., vol. 1, no. 1, pp. 67–69, 2003.

A. Juels, “RFID security and privacy: A research survey,” IEEE J. Sel. areas Commun., vol. 24, no. 2, pp. 381–394, 2006.

G. Zyskind and O. Nathan, “Decentralizing privacy: Using blockchain to protect personal data,” in 2015 IEEE security and privacy workshops, 2015, pp. 180–184.

J. Lin, W. Yu, N. Zhang, X. Yang, H. Zhang, and W. Zhao, “A survey on internet of things: Architecture, enabling technologies, security and privacy, and applications,” IEEE internet things J., vol. 4, no. 5, pp. 1125–1142, 2017.

H. J. Smith, T. Dinev, and H. Xu, “Information privacy research: an interdisciplinary review,” MIS Q., pp. 989–1015, 2011.

S. A. Weis, S. E. Sarma, R. L. Rivest, and D. W. Engels, “Security and privacy aspects of low-cost radio frequency identification systems,” in Security in Pervasive Computing: First International Conference, Boppard, Germany, March 12-14, 2003. Revised Papers, 2004, pp. 201–212.

N. K. Ratha, J. H. Connell, and R. M. Bolle, “Enhancing security and privacy in biometrics-based authentication systems,” IBM Syst. J., vol. 40, no. 3, pp. 614–634, 2001.

H. Takabi, J. B. D. Joshi, and G.-J. Ahn, “Security and privacy challenges in cloud computing environments,” IEEE Secur. Priv., vol. 8, no. 6, pp. 24–31, 2010.

F. Belanger, J. S. Hiller, and W. J. Smith, “Trustworthiness in electronic commerce: the role of privacy, security, and site attributes,” J. Strateg. Inf. Syst., vol. 11, no. 3–4, pp. 245–270, 2002.

R. H. Weber, “Internet of Things–New security and privacy challenges,” Comput. law Secur. Rev., vol. 26, no. 1, pp. 23–30, 2010.

Downloads

Published

2023-08-28

How to Cite

Pratomo, A. B., Mokodenseho, S., & Aziz, A. M. (2023). Data Encryption and Anonymization Techniques for Enhanced Information System Security and Privacy. West Science Information System and Technology, 1(01), 1–9. https://doi.org/10.58812/wsist.v1i01.176