Enhancing Data Privacy: A Comprehensive Survey of Privacy-Enabling Technologies

被引:0
|
作者
Razi, Qaiser [1 ]
Piyush, Raja [2 ]
Chakrabarti, Arjab [2 ]
Singh, Anushka [2 ]
Hassija, Vikas [2 ]
Chalapathi, G. S. S. [1 ]
机构
[1] Birla Inst Technol & Sci BITS Pilani, Dept Elect & Elect Engn, Pilani Campus, Pilani 333031, Rajasthan, India
[2] Kalinga Inst Ind Technol KIIT, Sch Comp Engn, Bhubaneswar 75102, Odisha, India
来源
IEEE ACCESS | 2025年 / 13卷
关键词
Data privacy; Privacy; Information integrity; Information filtering; Encryption; Synthetic data; Differential privacy; Surveys; Bayes methods; Protection; Privacy engineering; data anonymization; data encryption; synthetic data; differential privacy; privacy preservation; privacy technologies; DIFFERENTIAL PRIVACY; TARGET CLASSIFICATION; MANAGEMENT SCHEME; DE-ANONYMIZATION; BIG DATA; ENCRYPTION; UTILITY; MICROAGGREGATION; ALGORITHM; EFFICIENT;
D O I
10.1109/ACCESS.2025.3546618
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Privacy is a fundamental human right, especially crucial in our modern digital age. With the rapid advancement of technology, ensuring individuals' privacy has become increasingly complex. Our survey paper aims to shed light on various privacy engineering technologies that play a crucial role in protecting personal data. We delve into four key areas: data anonymization, data encryption, synthetic data generation, and differential privacy. These technologies serve as essential tools in safeguarding online privacy. Data anonymization, for instance, includes removing or modifying identifiable information from datasets to protect individuals' identities. Encryption secures data by converting it into a code that can only be decoded by authorized parties. Synthetic data generation creates artificial data that closely resembles real data but doesn't contain any identifiable information. Differential privacy adds a small amount of controlled noise to protect sensitive information. Throughout our exploration, we not only explain the principles and techniques behind these technologies but also the tools used for each of these techniques and evaluation criteria and also examine their practical applications. By understanding their strengths, limitations, and real-world implementations, we gain valuable insights into how they contribute to the broader goal of ensuring privacy in our digital world.
引用
收藏
页码:40354 / 40385
页数:32
相关论文
共 50 条
  • [41] Privacy-Enhancing Technologies in Federated Learning for the Internet of Healthcare Things: A Survey
    Mosaiyebzadeh, Fatemeh
    Pouriyeh, Seyedamin
    Parizi, Reza M.
    Sheng, Quan Z.
    Han, Meng
    Zhao, Liang
    Sannino, Giovanna
    Ranieri, Caetano Mazzoni
    Ueyama, Jo
    Batista, Daniel Macedo
    ELECTRONICS, 2023, 12 (12)
  • [42] A Survey on Transparency Tools for Enhancing Privacy
    Hedbom, Hans
    FUTURE OF IDENTITY IN THE INFORMATION SOCIETY, 2009, : 67 - 82
  • [43] A Comprehensive Survey on Local Differential Privacy
    Xiong, Xingxing
    Liu, Shubo
    Li, Dan
    Cai, Zhaohui
    Niu, Xiaoguang
    SECURITY AND COMMUNICATION NETWORKS, 2020, 2020
  • [44] Security and Privacy in Metaverse: A Comprehensive Survey
    Huang, Yan
    Li, Yi
    Cai, Zhipeng
    BIG DATA MINING AND ANALYTICS, 2023, 6 (02) : 234 - 247
  • [45] Critical RFID Privacy-Enhancing Technologies
    Spiekermann, Sarah
    Evdokimov, Sergei
    IEEE SECURITY & PRIVACY, 2009, 7 (02) : 56 - 62
  • [46] A pattern language for developing privacy enhancing technologies
    Hafiz, Munawar
    SOFTWARE-PRACTICE & EXPERIENCE, 2013, 43 (07): : 769 - 787
  • [47] Privacy-enhancing technologies - approaches and development
    Senicar, V
    Jerman-Blazic, B
    Klobucar, T
    COMPUTER STANDARDS & INTERFACES, 2003, 25 (02) : 147 - 158
  • [48] Language Support for Multiple Privacy Enhancing Technologies
    Oak, Aditya
    Mezini, Mira
    Salvaneschi, Guido
    PROGRAMMING 2019: PROCEEDINGS OF THE CONFERENCE COMPANION OF THE 3RD INTERNATIONAL CONFERENCE ON ART, SCIENCE, AND ENGINEERING OF PROGRAMMING, 2019,
  • [49] Current and future privacy enhancing technologies for the Internet
    Deswarte, Yves
    Melchor, Carlos Aguilar
    ANNALS OF TELECOMMUNICATIONS, 2006, 61 (3-4) : 399 - 417
  • [50] Usage Patterns of Privacy-Enhancing Technologies
    Coopamootoo, Kovila P. L.
    CCS '20: PROCEEDINGS OF THE 2020 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2020, : 1371 - 1390