Enhancing Data Privacy: A Comprehensive Survey of Privacy-Enabling Technologies

被引:0
|
作者
Razi, Qaiser [1 ]
Piyush, Raja [2 ]
Chakrabarti, Arjab [2 ]
Singh, Anushka [2 ]
Hassija, Vikas [2 ]
Chalapathi, G. S. S. [1 ]
机构
[1] Birla Inst Technol & Sci BITS Pilani, Dept Elect & Elect Engn, Pilani Campus, Pilani 333031, Rajasthan, India
[2] Kalinga Inst Ind Technol KIIT, Sch Comp Engn, Bhubaneswar 75102, Odisha, India
来源
IEEE ACCESS | 2025年 / 13卷
关键词
Data privacy; Privacy; Information integrity; Information filtering; Encryption; Synthetic data; Differential privacy; Surveys; Bayes methods; Protection; Privacy engineering; data anonymization; data encryption; synthetic data; differential privacy; privacy preservation; privacy technologies; DIFFERENTIAL PRIVACY; TARGET CLASSIFICATION; MANAGEMENT SCHEME; DE-ANONYMIZATION; BIG DATA; ENCRYPTION; UTILITY; MICROAGGREGATION; ALGORITHM; EFFICIENT;
D O I
10.1109/ACCESS.2025.3546618
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Privacy is a fundamental human right, especially crucial in our modern digital age. With the rapid advancement of technology, ensuring individuals' privacy has become increasingly complex. Our survey paper aims to shed light on various privacy engineering technologies that play a crucial role in protecting personal data. We delve into four key areas: data anonymization, data encryption, synthetic data generation, and differential privacy. These technologies serve as essential tools in safeguarding online privacy. Data anonymization, for instance, includes removing or modifying identifiable information from datasets to protect individuals' identities. Encryption secures data by converting it into a code that can only be decoded by authorized parties. Synthetic data generation creates artificial data that closely resembles real data but doesn't contain any identifiable information. Differential privacy adds a small amount of controlled noise to protect sensitive information. Throughout our exploration, we not only explain the principles and techniques behind these technologies but also the tools used for each of these techniques and evaluation criteria and also examine their practical applications. By understanding their strengths, limitations, and real-world implementations, we gain valuable insights into how they contribute to the broader goal of ensuring privacy in our digital world.
引用
收藏
页码:40354 / 40385
页数:32
相关论文
共 50 条
  • [21] A Comprehensive Survey on Security and Privacy for Electronic Health Data
    Oh, Se-Ra
    Seo, Young-Duk
    Lee, Euijong
    Kim, Young-Gab
    INTERNATIONAL JOURNAL OF ENVIRONMENTAL RESEARCH AND PUBLIC HEALTH, 2021, 18 (18)
  • [22] A Comprehensive Survey on Privacy Preservation Algorithms in Data Mining
    Kiran, Ajmeera
    Vasumathi, D.
    2017 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMPUTING RESEARCH (ICCIC), 2017, : 1060 - 1066
  • [23] Emerging technologies towards enhancing privacy in genomic data sharing
    Berger, Bonnie
    Cho, Hyunghoon
    GENOME BIOLOGY, 2019, 20 (1)
  • [24] Emerging technologies towards enhancing privacy in genomic data sharing
    Bonnie Berger
    Hyunghoon Cho
    Genome Biology, 20
  • [25] Privacy Enhancing Technologies (PETs) and Investment Strategies for a Data Market
    Chun, Se-Hak
    PROCEEDINGS OF 3RD WORLD CONFERENCE ON PSYCHOLOGY AND SOCIOLOGY, 2015, 185 : 271 - 275
  • [26] AGAPECert: An Auditable, Generalized, Automated, Privacy-Enabling Certification Framework With Oblivious Smart Contracts
    Palacios, Servio
    Ault, Aaron
    Krogmeier, James V.
    Bhargava, Bharat
    Brinton, Christopher G.
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2023, 20 (04) : 3269 - 3286
  • [27] A Survey on Digital Twins: Architecture, Enabling Technologies, Security and Privacy, and Future Prospects
    Wang Y.
    Su Z.
    Guo S.
    Dai M.
    Luan T.H.
    Liu Y.
    IEEE Internet of Things Journal, 2023, 10 (17) : 14965 - 14987
  • [28] A comprehensive survey on security, privacy issues and emerging defence technologies for UAVs
    Hadi, Hassan Jalil
    Cao, Yue
    Nisa, Khaleeq Un
    Jamil, Abdul Majid
    Ni, Qiang
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2023, 213
  • [29] On the Adoption of Privacy-enhancing Technologies
    Caulfield, Tristan
    Ioannidis, Christos
    Pym, David
    DECISION AND GAME THEORY FOR SECURITY, (GAMESEC 2016), 2016, 9996 : 175 - 194
  • [30] Privacy-enhancing technologies for the Internet
    Goldberg, I
    Wagner, D
    Brewer, E
    IEEE COMPCON 97, PROCEEDINGS, 1997, : 103 - 109