Privacy preservation techniques through data lifecycle: A comprehensive literature survey

被引:0
作者
Madhusudhanan, Sheema [1 ]
Jose, Arun Cyril [1 ]
机构
[1] Department of Computer Science and Engineering, Indian Institute of Information Technology Kottayam (IIITK), Kerala, Kottayam
关键词
Anonymization techniques; Data processing lifecycle; Machine learning for privacy; Privacy preservation; Transaction anonymity;
D O I
10.1016/j.cose.2025.104473
中图分类号
学科分类号
摘要
With the increasing user data volume, safeguarding sensitive information has become more critical than ever. This survey reviews privacy-preserving techniques and models designed to protect Personally Identifiable Information (PII) and other sensitive data. Privacy is essential at every data lifecycle stage, including data collection, storage, processing, sharing and transmission, retention and deletion, and access control. We discuss the challenges associated with each stage and highlight relevant research work. The survey concludes with a discussion of ongoing challenges and potential research directions in data privacy preservation. © 2025 Elsevier Ltd
引用
收藏
相关论文
共 182 条
  • [21] Banaeian Far S., Asaar M.R., Haghbin A., Distributed auditing protocol for untraceable transactions, J. Inf. Secur. Appl., 73, 100, pp. 1-14, (2023)
  • [22] Bao Z., He D., Khan M.K., Luo M., Xie Q., PBidm: Privacy-preserving blockchain-based identity management system for industrial internet of things, IEEE Trans. Ind. Inform., 19, 2, pp. 1524-1534, (2023)
  • [23] Barker S., Sergot M.J., Wijesekera D., Status-based access control, ACM Trans. Inf. Syst. Secur., 12, 1, pp. 1-47, (2008)
  • [24] Beigi G., Liu H., A survey on privacy in social media: Identification, mitigation, and applications, ACM/ IMS Trans. Data Sci., 1, 1, pp. 1-38, (2020)
  • [25] Belchior R., Riley L., Hardjono T., Vasconcelos A., Correia M., Do you need a distributed ledger technology interoperability solution?, Distrib. Ledger Technol., 2, 1, pp. 1-37, (2023)
  • [26] Bella G., Giustolisi R., Riccobene S., Enforcing privacy in e-commerce by balancing anonymity and trust, Comput. Secur., 30, 8, pp. 705-718, (2011)
  • [27] Ben-Sasson E., Bentov I., Horesh Y., Riabzev M., Scalable, transparent, and post-quantum secure computational integrity, pp. 1-46, (2018)
  • [28] Ben-Shahar O., Data pollution, J. Leg. Anal., 11, pp. 104-159, (2019)
  • [29] Benomar Z., Longo F., Merlino G., Puliafito A., Cloud-based enabling mechanisms for container deployment and migration at the network edge, ACM Trans. Internet Technol., 20, 3, pp. 1-28, (2020)
  • [30] Berke A., Calacci D., Privacy limitations of interest-based advertising on the web: A post-mortem empirical analysis of google's floc, Proc. of the ACM SIGSAC Conf. on Computer and Commun. Security, CCS, pp. 337-349, (2022)