[go: up one dir, main page]

 
 
Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

Search Results (90)

Search Parameters:
Keywords = general data protection regulation (GDPR)

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
22 pages, 2285 KiB  
Article
A Privacy-Preserving Scheme for a Traffic Accident Risk Level Prediction System
by Pablo Marcillo, Gabriela Suntaxi and Myriam Hernández-Álvarez
Appl. Sci. 2024, 14(21), 9876; https://doi.org/10.3390/app14219876 - 29 Oct 2024
Viewed by 468
Abstract
Due to the expansion of Artificial Intelligence (AI), especially Machine Learning (ML), it is more common to face confidentiality regulations about using sensitive data in learning models generally hosted in cloud environments. Confidentiality regulations such as HIPAA and GDPR seek to guarantee the [...] Read more.
Due to the expansion of Artificial Intelligence (AI), especially Machine Learning (ML), it is more common to face confidentiality regulations about using sensitive data in learning models generally hosted in cloud environments. Confidentiality regulations such as HIPAA and GDPR seek to guarantee the confidentiality and privacy of personal information. Input and output data of a learning model may include sensitive data that must be protected. Adversaries could intercept and exploit this data to infer more sensitive data or even to determine the structure of the prediction model. To guarantee data privacy, one option could be encrypting data and making inferences over encrypted data. This strategy would be challenging for learning models that now must receive encrypted data, make inferences over encrypted data, and deliver encrypted data. To address this issue, this paper presents a privacy-preserving machine learning approach using Fully Homomorphic Encryption (FHE) for a model that predicts risk levels of suffering a traffic accident. Despite the limitations of experimenting with FHE on machine learning models using a low-performance computer, limitations that are undoubtedly overcome by using high-performance computational infrastructure, we built some encrypted models. Among the encrypted models based on Decision Trees, Random Forests, XGBoost, and Fully Connected Neural Networks (FCNN), the model based on FCNN reached the highest accuracy (80.1%) for the lowest inference time (8.476 s). Full article
(This article belongs to the Special Issue Privacy and Security in Machine Learning and Artificial Intelligence)
Show Figures

Figure 1

Figure 1
<p>Architecture of the Risk Level Prediction System.</p>
Full article ">Figure 2
<p>Location of adversaries into the system architecture.</p>
Full article ">Figure 3
<p>Privacy-preserving scheme for the learning model.</p>
Full article ">Figure 4
<p>Analysis of the results obtained in evaluating the encrypted models using their optimal configurations (<a href="#applsci-14-09876-t005" class="html-table">Table 5</a>).</p>
Full article ">Figure 5
<p>Analysis of the results obtained in evaluating the encrypted model based on Random Forest (<a href="#applsci-14-09876-t006" class="html-table">Table 6</a>).</p>
Full article ">
8 pages, 212 KiB  
Proceeding Paper
Constructing Cyber Resilience: A Focus on Cybersecurity Measures in the South African Construction Sector
by Seyi Stephen, Clinton Aigbavboa, Ayodeji Oke, Opeoluwa Akinradewo and Ayobami Idowu
Eng. Proc. 2024, 76(1), 3; https://doi.org/10.3390/engproc2024076003 - 15 Oct 2024
Viewed by 353
Abstract
In addressing the challenges of cyber threats in the South African construction sector, the study employed a quantitative methodology involving a questionnaire retrieved from 86 of the study’s respondents. It employed tools like mean item score (MIS), standard deviation (SD), and the pattern [...] Read more.
In addressing the challenges of cyber threats in the South African construction sector, the study employed a quantitative methodology involving a questionnaire retrieved from 86 of the study’s respondents. It employed tools like mean item score (MIS), standard deviation (SD), and the pattern matrix of exploratory factor analysis (EFA). The findings revealed critical cybersecurity measures, including adherence to international information security standards such as the General Data Protection Regulation (GDPR), ISO 27001, or the Cybersecurity Framework by NIST, two-factor authentication, and strategic planning. The implications of these findings underscore the importance of robust cybersecurity frameworks and heightened awareness. This research contributes insights for enhancing cyber resilience in the construction industry, urging stakeholders to prioritize protective measures against cyber risks. Full article
14 pages, 884 KiB  
Article
Use Cases Requiring Privacy-Preserving Record Linkage in Paediatric Oncology
by Dieter Hayn, Karl Kreiner, Emanuel Sandner, Martin Baumgartner, Bernhard Jammerbund, Markus Falgenhauer, Vanessa Düster, Priyanka Devi-Marulkar, Gudrun Schleiermacher, Ruth Ladenstein and Guenter Schreier
Cancers 2024, 16(15), 2696; https://doi.org/10.3390/cancers16152696 - 29 Jul 2024
Viewed by 714
Abstract
Large datasets in paediatric oncology are inherently rare. Therefore, it is paramount to fully exploit all available data, which are distributed over several resources, including biomaterials, images, clinical trials, and registries. With privacy-preserving record linkage (PPRL), personalised or pseudonymised datasets can be merged, [...] Read more.
Large datasets in paediatric oncology are inherently rare. Therefore, it is paramount to fully exploit all available data, which are distributed over several resources, including biomaterials, images, clinical trials, and registries. With privacy-preserving record linkage (PPRL), personalised or pseudonymised datasets can be merged, without disclosing the patients’ identities. Although PPRL is implemented in various settings, use case descriptions are currently fragmented and incomplete. The present paper provides a comprehensive overview of current and future use cases for PPRL in paediatric oncology. We analysed the literature, projects, and trial protocols, identified use cases along a hypothetical patient journey, and discussed use cases with paediatric oncology experts. To structure PPRL use cases, we defined six key dimensions: distributed personalised records, pseudonymisation, distributed pseudonymised records, record linkage, linked data, and data analysis. Selected use cases were described (a) per dimension and (b) on a multi-dimensional level. While focusing on paediatric oncology, most aspects are also applicable to other (particularly rare) diseases. We conclude that PPRL is a key concept in paediatric oncology. Therefore, PPRL strategies should already be considered when starting research projects, to avoid distributed data silos, to maximise the knowledge derived from collected data, and, ultimately, to improve outcomes for children with cancer. Full article
(This article belongs to the Special Issue Advances in Cancer Data and Statistics)
Show Figures

Graphical abstract

Graphical abstract
Full article ">Figure 1
<p>(<b>a</b>) Merging patients from contexts with identical variables mainly focuses on the identification of duplicate patient records in different contexts. (<b>b</b>) Merging different data types from multiple sources holding the same patients focuses on the identification of related patient records in different contexts.</p>
Full article ">Figure 2
<p>Hypothetical patient journey and related data sources. In this example, a patient is diagnosed with a primary tumour that worsens during treatment in trial 1. Treatment in a second trial 2 is successful. The cancer survivor suffers from a relapse a certain time after healing, which can again be treated successfully. In this patient journey, we end up with nine different pseudonyms (PSNs) for one patient. Green: personalised data; yellow: pseudonymised data; blue: linked data.</p>
Full article ">Figure 3
<p>Overview of data residing in personalised routine care and different pseudonymised contexts, illustrating how data can be linked and how the linked data can be analysed to obtain new knowledge. On the right-hand side, the relation to the respective six key dimensions of record linkage is shown. Grey boxes reference chapters describing single-dimensional use cases.</p>
Full article ">
34 pages, 359 KiB  
Article
Navigating Blockchain’s Twin Challenges: Scalability and Regulatory Compliance
by Shezon Saleem Mohammed Abdul
Blockchains 2024, 2(3), 265-298; https://doi.org/10.3390/blockchains2030013 - 21 Jul 2024
Cited by 1 | Viewed by 4464
Abstract
Blockchain technology promises transformative potential across diverse sectors, facilitating innovations in areas ranging from finance to healthcare. Despite its many promising applications, several barriers—including scalability challenges, regulatory complexities, and technical hurdles—limit its widespread adoption. This systematic literature review delves into scalability enhancements and [...] Read more.
Blockchain technology promises transformative potential across diverse sectors, facilitating innovations in areas ranging from finance to healthcare. Despite its many promising applications, several barriers—including scalability challenges, regulatory complexities, and technical hurdles—limit its widespread adoption. This systematic literature review delves into scalability enhancements and explores the legal and regulatory landscapes impacting blockchain deployment in ten key sectors: IoT, healthcare, finance, education, social media, genomics, supply chain, vehicular networks, e-voting, and tourism. These sectors were selected based on their significant engagement with blockchain technology and their prominence in the analyzed literature. We examine key technological advancements such as Layer-2 techniques, sharding, consensus algorithm optimization, and rollups, and discuss their implications for throughput, latency, and compliance with regulatory standards such as the General Data Protection Regulation (GDPR). The review details these technological and regulatory developments and discusses their broader implications for industry and academia, emphasizing the need for interdisciplinary research and innovation. By identifying gaps in current research and suggesting future directions, this study serves as a roadmap for researchers, practitioners, and policymakers to develop secure, scalable, and compliant blockchain systems. Our comprehensive examination provides valuable insights into enhancing the efficiency, security, and regulatory compliance of blockchain technology. Full article
19 pages, 2171 KiB  
Article
Digital Identity in the EU: Promoting eIDAS Solutions Based on Biometrics
by Pietro Ruiu, Salvatore Saiu and Enrico Grosso
Future Internet 2024, 16(7), 228; https://doi.org/10.3390/fi16070228 - 28 Jun 2024
Viewed by 1462
Abstract
Today, more than ever before, technological progress is evolving rapidly, and in the absence of adequate regulatory frameworks, the big players in the digital market (the so-called Big Techs) are exploiting personal data (name, address, telephone numbers) and private data (political opinions, religious [...] Read more.
Today, more than ever before, technological progress is evolving rapidly, and in the absence of adequate regulatory frameworks, the big players in the digital market (the so-called Big Techs) are exploiting personal data (name, address, telephone numbers) and private data (political opinions, religious beliefs, financial information, or health status) in an uncontrolled manner. A crucial role in this scenario is played by the weakness of international regulatory frameworks due to the slow response time of legislators who are incapable, from a regulatory point of view, of keeping pace with technological evolution and responding to the new requirements coming from the social context, which is increasingly characterized by the pervasive presence of new technologies, such as smartphones and wearable devices. At the European level, the General Data Protection Regulation (GDPR) and the Regulation on Electronic Identification, Authentication and Trust Services (eIDAS) have marked a significant turning point in the regulatory landscape. However, the mechanisms proposed present clear security issues, particularly in light of emerging concepts such as digital identity. Moreover, despite the centrality of biometric issues within the European regulatory framework and the practical introduction of biometric data within electronic national identity (eID) cards, there are still no efforts to use biometric features for the identification and authentication of a person in a digital context. This paper clarifies and precisely defines the potential impact of biometric-based digital identity and hypothesizes its practical use for accessing network-based services and applications commonly used in daily life. Using the Italian eID card as a model, an authentication scheme leveraging biometric data is proposed, ensuring full compliance with GDPR and eIDAS regulations. The findings suggest that such a scheme can significantly improve the security and reliability of electronic identification systems, promoting broader adoption of eIDAS solutions. Full article
Show Figures

Figure 1

Figure 1
<p>The two phases of a digital identity scheme.</p>
Full article ">Figure 2
<p>High-level overview of the eIDAS solution.</p>
Full article ">Figure 3
<p>Integration of the face recognition task in the current eID authentication schema.</p>
Full article ">Figure 4
<p>Schema of the process of generating the probe and gallery images for the face recognition algorithm.</p>
Full article ">Figure 5
<p>Authentication scheme of the proposed solution integrated within a simplified version of the eID’s authentication scheme.</p>
Full article ">
34 pages, 2878 KiB  
Article
Privacy Essentials
by James Taylor, Jane Henriksen-Bulmer and Cagatay Yucel
Electronics 2024, 13(12), 2263; https://doi.org/10.3390/electronics13122263 - 9 Jun 2024
Viewed by 857
Abstract
Following a series of legislative changes around privacy over the past 25 years, this study highlights data protection regulations and the complexities of applying these frameworks. To address this, we created a privacy framework to guide organisations in what steps they need to [...] Read more.
Following a series of legislative changes around privacy over the past 25 years, this study highlights data protection regulations and the complexities of applying these frameworks. To address this, we created a privacy framework to guide organisations in what steps they need to undertake to achieve compliance with the UK GDPR, highlighting the existing privacy frameworks for best practice and the requirements from the Information Commissioners Office. We applied our framework to a UK charity sector; to account for the specific nuances that working in a charity brings, we worked closely with local charities to understand their requirements, and interviewed privacy experts to develop a framework that is readily accessible and provides genuine value. Feeding the results into our privacy framework, a decision tree artefact has been developed for compliance. The artefact has been tested against black-box tests, System Usability Tests and UX Honeycomb tests. Results show that Privacy Essentials! provides the foundation of a data protection management framework and offers organisations the catalyst to start, enhance, or even validate a solid and effective data privacy programme. Full article
(This article belongs to the Special Issue Recent Advances in Information Security and Data Privacy)
Show Figures

Figure 1

Figure 1
<p>Data Privacy-Rich Picture.</p>
Full article ">Figure 2
<p>Persona, Chief Executive Officer.</p>
Full article ">Figure 3
<p>Persona, Head of Marketing.</p>
Full article ">Figure 4
<p>Persona, Head of Finance.</p>
Full article ">Figure 5
<p>Client consultation form (redacted).</p>
Full article ">Figure 6
<p>Volere “snow card” requirement.</p>
Full article ">Figure 7
<p>Mind map of entities and data types.</p>
Full article ">Figure 8
<p>Privacy Essentials! conceptual design.</p>
Full article ">Figure 9
<p>Privacy Essentials! data collection form.</p>
Full article ">Figure 10
<p>Observations example from workflow Tab (1).</p>
Full article ">Figure 11
<p>Observations example from policy Tab (1).</p>
Full article ">Figure 12
<p>Observations example from workflow Tab (2).</p>
Full article ">Figure 13
<p>Observations example from policy Tab (2).</p>
Full article ">Figure 14
<p>Privacy Essentials! welcome screen.</p>
Full article ">Figure 15
<p>Example black-box test.</p>
Full article ">Figure 16
<p>SUS questions.</p>
Full article ">Figure 17
<p>SUS results compared to ideal.</p>
Full article ">Figure 18
<p>SUS adjective table.</p>
Full article ">Figure 19
<p>Privacy Essentials! v.1.0 Workflow page.</p>
Full article ">Figure 20
<p>Privacy Essentials! v.2.0 Workflow page.</p>
Full article ">Figure 21
<p>UX Honeycomb survey outcomes (adapted from [<a href="#B62-electronics-13-02263" class="html-bibr">62</a>]).</p>
Full article ">Figure 22
<p>Privacy Essentials!—DRR/Article 30 Page.</p>
Full article ">
25 pages, 4023 KiB  
Article
A Privacy-Preserving Approach to Effectively Utilize Distributed Data for Malaria Image Detection
by Amer Kareem, Haiming Liu and Vladan Velisavljevic
Bioengineering 2024, 11(4), 340; https://doi.org/10.3390/bioengineering11040340 - 30 Mar 2024
Cited by 2 | Viewed by 1054
Abstract
Malaria is one of the life-threatening diseases caused by the parasite known as Plasmodium falciparum, affecting the human red blood cells. Therefore, it is an important to have an effective computer-aided system in place for early detection and treatment. The visual heterogeneity of [...] Read more.
Malaria is one of the life-threatening diseases caused by the parasite known as Plasmodium falciparum, affecting the human red blood cells. Therefore, it is an important to have an effective computer-aided system in place for early detection and treatment. The visual heterogeneity of the malaria dataset is highly complex and dynamic, therefore higher number of images are needed to train the machine learning (ML) models effectively. However, hospitals as well as medical institutions do not share the medical image data for collaboration due to general data protection regulations (GDPR) and the data protection act (DPA). To overcome this collaborative challenge, our research utilised real-time medical image data in the framework of federated learning (FL). We have used state-of-the-art ML models that include the ResNet-50 and DenseNet in a federated learning framework. We have experimented both models in different settings on a malaria dataset constituting 27,560 publicly available images and our preliminary results showed that the DenseNet model performed better in accuracy (75%) in contrast to ResNet-50 (72%) while considering eight clients, while the trend was observed as common in four clients with the similar accuracy of 94%, and six clients showed that the DenseNet model performed quite well with the accuracy of 92%, while ResNet-50 achieved only 72%. The federated learning framework enhances the accuracy due to its decentralised nature, continuous learning, and effective communication among clients, as well as the efficient local adaptation. The use of federated learning architecture among the distinct clients for ensuring the data privacy and following GDPR is the contribution of this research work. Full article
(This article belongs to the Section Biosignal Processing)
Show Figures

Figure 1

Figure 1
<p>Proposed framework showing the hybrid architecture constitute of CNN based pre-trained model in federated learning. “Local device*”, where “*” shows the device 2 and device 3.</p>
Full article ">Figure 2
<p>Data loader function.</p>
Full article ">Figure 3
<p>Malaria dataset distribution.</p>
Full article ">Figure 4
<p>Distinguishing between the cells among the two classes of help models, i.e., resent50 and DenseNet, to learn the patterns from the cells. Therefore, the ML models classify cells with the presence of dots as parasitised and those without dots as uninfected.</p>
Full article ">Figure 5
<p>Random images of the sample training images.</p>
Full article ">Figure 6
<p>Images from the sample validation images.</p>
Full article ">Figure 7
<p>The confusion matrix for DenseNet and ResNet-50 with 4 clients.</p>
Full article ">Figure 8
<p>Train and validation loss on ResNet-50 on 4 clients.</p>
Full article ">Figure 9
<p>Train and validation loss on DenseNet on 4 clients.</p>
Full article ">Figure 10
<p>Confusion matrix of FL_DenseNet and FL_ResNet-50 (6 Clients).</p>
Full article ">Figure 11
<p>Train and validation loss on DenseNet on 8 clients.</p>
Full article ">Figure 12
<p>Confusion matrix of FL_DenseNet and FL_ResNet-50 (8 Clients).</p>
Full article ">
23 pages, 625 KiB  
Article
Data Protection Issues in Automated Decision-Making Systems Based on Machine Learning: Research Challenges
by Paraskevi Christodoulou and Konstantinos Limniotis
Network 2024, 4(1), 91-113; https://doi.org/10.3390/network4010005 - 1 Mar 2024
Viewed by 1713
Abstract
Data protection issues stemming from the use of machine learning algorithms that are used in automated decision-making systems are discussed in this paper. More precisely, the main challenges in this area are presented, putting emphasis on how important it is to simultaneously ensure [...] Read more.
Data protection issues stemming from the use of machine learning algorithms that are used in automated decision-making systems are discussed in this paper. More precisely, the main challenges in this area are presented, putting emphasis on how important it is to simultaneously ensure the accuracy of the algorithms as well as privacy and personal data protection for the individuals whose data are used for training the corresponding models. In this respect, we also discuss how specific well-known data protection attacks that can be mounted in processes based on such algorithms are associated with a lack of specific legal safeguards; to this end, the General Data Protection Regulation (GDPR) is used as the basis for our evaluation. In relation to these attacks, some important privacy-enhancing techniques in this field are also surveyed. Moreover, focusing explicitly on deep learning algorithms as a type of machine learning algorithm, we further elaborate on one such privacy-enhancing technique, namely, the application of differential privacy to the training dataset. In this respect, we present, through an extensive set of experiments, the main difficulties that occur if one needs to demonstrate that such a privacy-enhancing technique is, indeed, sufficient to mitigate all the risks for the fundamental rights of individuals. More precisely, although we manage—by the proper configuration of several algorithms’ parameters—to achieve accuracy at about 90% for specific privacy thresholds, it becomes evident that even these values for accuracy and privacy may be unacceptable if a deep learning algorithm is to be used for making decisions concerning individuals. The paper concludes with a discussion of the current challenges and future steps, both from a legal as well as from a technical perspective. Full article
Show Figures

Figure 1

Figure 1
<p>The methodology adopted (CIFAR-10 dataset).</p>
Full article ">
23 pages, 660 KiB  
Article
A Reference Design Model to Manage Consent in Data Subjects-Centered Internet of Things Devices
by Pankaj Khatiwada, Bian Yang, Jia-Chun Lin, Godfrey Mugurusi and Stian Underbekken
IoT 2024, 5(1), 100-122; https://doi.org/10.3390/iot5010006 - 6 Feb 2024
Cited by 1 | Viewed by 2430
Abstract
Internet of Things (IoT) devices have changed how billions of people in the world connect and interact with each other. But, as more people use IoT devices, many questions arise about how these devices handle private data and whether they properly ask for [...] Read more.
Internet of Things (IoT) devices have changed how billions of people in the world connect and interact with each other. But, as more people use IoT devices, many questions arise about how these devices handle private data and whether they properly ask for permission when using it. Due to information privacy regulations such as the EU’s General Data Protection Regulation (GDPR), which requires companies to seek permission from data subjects (DS) before using their data, it is crucial for IoT companies to obtain this permission correctly. However, this can be really challenging in the IoT world because people often find it difficult to interact with and manage multiple IoT devices under their control. Also, the rules about privacy are not always clear. As such, this paper proposes a new model to improve how consent is managed in the world of IoT. The model seeks to minimize “consent fatigue” (when people get tired of always being asked for permission) and give DS more control over how their data are shared. This includes having default permission settings, being able to compare similar devices, and, in the future, using AI to give personalized advice. The model allows users to easily review and change their IoT device permissions if previous conditions are not met. It also emphasizes the need for easily understandable privacy rules, clear communication with users, and robust tracking of consent for data usage. By using this model, companies that provide IoT services can do a better job of protecting user privacy and managing DS consent. In addition, companies can more easily comply with data protection laws and build stronger relationships with their customers. Full article
Show Figures

Figure 1

Figure 1
<p>Concepts representing the context of consent.</p>
Full article ">Figure 2
<p>Consent framework.</p>
Full article ">
21 pages, 3058 KiB  
Article
A User-Centered Privacy Policy Management System for Automatic Consent on Cookie Banners
by Lorenzo Porcelli, Michele Mastroianni, Massimo Ficco and Francesco Palmieri
Computers 2024, 13(2), 43; https://doi.org/10.3390/computers13020043 - 1 Feb 2024
Viewed by 2287
Abstract
Despite growing concerns about privacy and an evolution in laws protecting users’ rights, there remains a gap between how industries manage data and how users can express their preferences. This imbalance often favors industries, forcing users to repeatedly define their privacy preferences each [...] Read more.
Despite growing concerns about privacy and an evolution in laws protecting users’ rights, there remains a gap between how industries manage data and how users can express their preferences. This imbalance often favors industries, forcing users to repeatedly define their privacy preferences each time they access a new website. This process contributes to the privacy paradox. We propose a user support tool named the User Privacy Preference Management System (UPPMS) that eliminates the need for users to handle intricate banners or deceptive patterns. We have set up a process to guide even a non-expert user in creating a standardized personal privacy policy, which is automatically applied to every visited website by interacting with cookie banners. The process of generating actions to apply the user’s policy leverages customized Large Language Models. Experiments demonstrate the feasibility of analyzing HTML code to understand and automatically interact with cookie banners, even implementing complex policies. Our proposal aims to address the privacy paradox related to cookie banners by reducing information overload and decision fatigue for users. It also simplifies user navigation by eliminating the need to repeatedly declare preferences in intricate cookie banners on every visited website, while protecting users from deceptive patterns. Full article
Show Figures

Figure 1

Figure 1
<p>The diagram illustrates how the proposed UPPMS integrates and interacts within the Transparency and Consent Framework. After a user has defined his policy, the UPPMS intercepts consent requests from CMPs and responds in a manner consistent with the user’s policy.</p>
Full article ">Figure 2
<p>Logical elements interacting with the UPPMS.</p>
Full article ">Figure 3
<p>User-guided privacy policy definition process.</p>
Full article ">Figure 4
<p>Rule generation process.</p>
Full article ">Figure 5
<p>Cookie banner as it appears upon the first visit to the Quantcast website.</p>
Full article ">Figure 6
<p>User behavior during the experiment with their self-reported behavior.</p>
Full article ">Figure 7
<p>Time taken by users to execute policies.</p>
Full article ">Figure 8
<p>Comparison of average time taken by users and UPPMS.</p>
Full article ">
19 pages, 1925 KiB  
Article
NFTs for the Issuance and Validation of Academic Information That Complies with the GDPR
by Christian Delgado-von-Eitzen, Luis Anido-Rifón and Manuel J. Fernández-Iglesias
Appl. Sci. 2024, 14(2), 706; https://doi.org/10.3390/app14020706 - 14 Jan 2024
Cited by 2 | Viewed by 1602
Abstract
The issuance and verification of academic certificates face significant challenges in the digital era. The proliferation of counterfeit credentials and the lack of a reliable, universally accepted system for issuing and validating them pose critical issues in the educational domain. Certificates, traditionally issued [...] Read more.
The issuance and verification of academic certificates face significant challenges in the digital era. The proliferation of counterfeit credentials and the lack of a reliable, universally accepted system for issuing and validating them pose critical issues in the educational domain. Certificates, traditionally issued by centralized educational institutions using their proprietary systems, pose challenges for straightforward verification, generating uncertainty about the credibility of academic achievements. In addition to diplomas issued by academic entities, it is now necessary in virtually all professional fields to stay updated and obtain accreditation for certain skills or experiences, which is a determining factor in securing or enhancing employment. Yet, there is no platform available to consistently demonstrate these capabilities and experiences. This article introduces a novel model for issuing and verifying academic information using non-fungible tokens (NFTs) supported by blockchain technologies, focused on compliance with the General Data Protection Regulation (GDPR). It describes a model that grants control to the data subject, enabling the management of information access while adhering to key GDPR principles. Simultaneously, it remains compatible with existing systems within organizations, and is flexible in certifying various types of academic information. The implications of this model are discussed, emphasizing the importance of addressing privacy in blockchain-based applications. Full article
Show Figures

Figure 1

Figure 1
<p>Proposed model (overview).</p>
Full article ">Figure 2
<p>Issuance of the academic information.</p>
Full article ">Figure 3
<p>A third party wants to access the NFT.</p>
Full article ">Figure 4
<p>Modification of the academic information.</p>
Full article ">
47 pages, 650 KiB  
Review
Balancing Privacy and Progress: A Review of Privacy Challenges, Systemic Oversight, and Patient Perceptions in AI-Driven Healthcare
by Steven M. Williamson and Victor Prybutok
Appl. Sci. 2024, 14(2), 675; https://doi.org/10.3390/app14020675 - 12 Jan 2024
Cited by 24 | Viewed by 37168
Abstract
Integrating Artificial Intelligence (AI) in healthcare represents a transformative shift with substantial potential for enhancing patient care. This paper critically examines this integration, confronting significant ethical, legal, and technological challenges, particularly in patient privacy, decision-making autonomy, and data integrity. A structured exploration of [...] Read more.
Integrating Artificial Intelligence (AI) in healthcare represents a transformative shift with substantial potential for enhancing patient care. This paper critically examines this integration, confronting significant ethical, legal, and technological challenges, particularly in patient privacy, decision-making autonomy, and data integrity. A structured exploration of these issues focuses on Differential Privacy as a critical method for preserving patient confidentiality in AI-driven healthcare systems. We analyze the balance between privacy preservation and the practical utility of healthcare data, emphasizing the effectiveness of encryption, Differential Privacy, and mixed-model approaches. The paper navigates the complex ethical and legal frameworks essential for AI integration in healthcare. We comprehensively examine patient rights and the nuances of informed consent, along with the challenges of harmonizing advanced technologies like blockchain with the General Data Protection Regulation (GDPR). The issue of algorithmic bias in healthcare is also explored, underscoring the urgent need for effective bias detection and mitigation strategies to build patient trust. The evolving roles of decentralized data sharing, regulatory frameworks, and patient agency are discussed in depth. Advocating for an interdisciplinary, multi-stakeholder approach and responsive governance, the paper aims to align healthcare AI with ethical principles, prioritize patient-centered outcomes, and steer AI towards responsible and equitable enhancements in patient care. Full article
(This article belongs to the Special Issue Data Privacy and Security for Information Engineering)
Show Figures

Figure 1

Figure 1
<p>Process map of research methodology.</p>
Full article ">
20 pages, 3321 KiB  
Article
Privacy-First Paradigm for Dynamic Consent Management Systems: Empowering Data Subjects through Decentralized Data Controllers and Privacy-Preserving Techniques
by Muhammad Irfan Khalid, Mansoor Ahmed, Markus Helfert and Jungsuk Kim
Electronics 2023, 12(24), 4973; https://doi.org/10.3390/electronics12244973 - 12 Dec 2023
Cited by 2 | Viewed by 1476
Abstract
This paper explicitly focuses on utilizing blockchain technology in dynamic consent management systems with privacy considerations. While blockchain offers improved security, the potential impact on entities’ privacy must be considered. Through a critical investigation of available contributions to the present state of the [...] Read more.
This paper explicitly focuses on utilizing blockchain technology in dynamic consent management systems with privacy considerations. While blockchain offers improved security, the potential impact on entities’ privacy must be considered. Through a critical investigation of available contributions to the present state of the art of blockchain-based dynamic consent management systems, we highlight the limitations of plaintext storage and the processing of subject data/consent on the blockchain, which can compromise privacy. We stress the significance of keeping encrypted subject data/consent on the blockchain and sharing it in encrypted form with data controllers and requesters to guarantee privacy and security. Our proposed model demonstrates the usefulness of privacy-preserving techniques, underscoring the decentralization of the abstract entity data controller to enhance subject data/consent privacy. Additionally, we suggest the integration of privacy-enhancing technologies such as secure multi-party computation, homomorphic encryption, and differential privacy with blockchain to accomplish both security and privacy, aligning with the data sharing practices outlined in the General Data Protection Regulation (GDPR) in Europe. Full article
(This article belongs to the Section Computer Science & Engineering)
Show Figures

Figure 1

Figure 1
<p>A classical dynamic consent management system.</p>
Full article ">Figure 2
<p>Real-world use case for the implementation of a dynamic consent management system.</p>
Full article ">Figure 3
<p>Proposed model of the decentralizing data controller and use of privacy-preserving techniques by the data subject and data controller.</p>
Full article ">
18 pages, 4448 KiB  
Article
Enhancing Safety on Construction Sites: A UWB-Based Proximity Warning System Ensuring GDPR Compliance to Prevent Collision Hazards
by Silvia Mastrolembo Ventura, Paolo Bellagente, Stefano Rinaldi, Alessandra Flammini and Angelo L. C. Ciribini
Sensors 2023, 23(24), 9770; https://doi.org/10.3390/s23249770 - 12 Dec 2023
Cited by 2 | Viewed by 1985
Abstract
Construction is known as one of the most dangerous industries in terms of worker safety. Collisions due the excessive proximity of workers to moving construction vehicles are one of the leading causes of fatal and non-fatal accidents on construction sites internationally. Proximity warning [...] Read more.
Construction is known as one of the most dangerous industries in terms of worker safety. Collisions due the excessive proximity of workers to moving construction vehicles are one of the leading causes of fatal and non-fatal accidents on construction sites internationally. Proximity warning systems (PWS) have been proposed in the literature as a solution to detect the risk for collision and to alert workers and equipment operators in time to prevent collisions. Although the role of sensing technologies for situational awareness has been recognised in previous studies, several factors still need to be considered. This paper describes the design of a prototype sensor-based PWS, aimed mainly at small and medium-sized construction companies, to collect real-time data directly from construction sites and to warn workers of a potential risk of collision accidents. It considers, in an integrated manner, factors such as cost of deployment, the actual nature of a construction site as an operating environment and data protection. A low-cost, ultra-wideband (UWB)-based proximity detection system has been developed that can operate with or without fixed anchors. In addition, the PWS is compliant with the General Data Protection Regulation (GDPR) of the European Union. A privacy-by-design approach has been adopted and privacy mechanisms have been used for data protection. Future work could evaluate the PWS in real operational conditions and incorporate additional factors for its further development, such as studies on the timely interpretation of data. Full article
Show Figures

Figure 1

Figure 1
<p>The typical architecture of a UWB RTLS network [<a href="#B8-sensors-23-09770" class="html-bibr">8</a>].</p>
Full article ">Figure 2
<p>The workflow diagram of research phases.</p>
Full article ">Figure 3
<p>Takeuchi TL6R front-end loader (<b>A</b>) and Takeuchi TB640 excavator (<b>B</b>) used in the research project to simulate construction activities.</p>
Full article ">Figure 4
<p>Preliminary assumptions for safety distances between an earth-moving construction vehicle and worker in its proximity [<a href="#B8-sensors-23-09770" class="html-bibr">8</a>].</p>
Full article ">Figure 5
<p>The DWM1001 Real-Time Location System (DRTLS) network and its components.</p>
Full article ">Figure 6
<p>Infrastructure site configuration of the PWS with fixed anchors [<a href="#B20-sensors-23-09770" class="html-bibr">20</a>]. C: Coordinator, A1, A2: Anchors, T: Tags.</p>
Full article ">Figure 7
<p>Infrastructure-less site configuration of the PWS without fixed anchors. A: Anchor, T: Tags, GW: Gateway.</p>
Full article ">
23 pages, 588 KiB  
Review
An Analytical Review of Industrial Privacy Frameworks and Regulations for Organisational Data Sharing
by Seyed Ramin Ghorashi, Tanveer Zia, Michael Bewong and Yinhao Jiang
Appl. Sci. 2023, 13(23), 12727; https://doi.org/10.3390/app132312727 - 27 Nov 2023
Cited by 1 | Viewed by 2996
Abstract
This study examines the privacy protection challenges in data sharing between organisations and third-party entities, focusing on changing collaborations in the digital age. Utilising a mixed-method approach, we categorise data-sharing practices into three business models, each with unique privacy concerns. The research reviews [...] Read more.
This study examines the privacy protection challenges in data sharing between organisations and third-party entities, focusing on changing collaborations in the digital age. Utilising a mixed-method approach, we categorise data-sharing practices into three business models, each with unique privacy concerns. The research reviews legal regulations like the General Data Protection Regulation (GDPR), highlighting their emphasis on user privacy protection but noting a lack of specific technical guidance. In contrast, industrial privacy frameworks such as NIST and Five Safes are explored for their comprehensive procedural and technical guidance, bridging the gap between legal mandates and practical applications. A key component of this study is the analysis of the Facebook–Cambridge Analytica data breach, which illustrates the significant privacy violations and their wider implications. This case study demonstrates how the principles of the NIST and Five Safes frameworks can effectively mitigate privacy risks, enhancing transparency and accountability in data sharing. Our findings highlight the dynamic nature of data sharing and the vital role of both privacy regulations and industry-specific frameworks in protecting individual privacy rights. This study contributes insights into the development of robust privacy strategies, highlighting the necessity of integrating comprehensive privacy frameworks into organisational practices for improved decision making, operational efficiency, and privacy protection in collaborative data environments. Full article
(This article belongs to the Section Computing and Artificial Intelligence)
Show Figures

Figure 1

Figure 1
<p>An overview of Facebook–Cambridge Analytica scandal in organisational data-sharing models (B2B, B2C, and C2C).</p>
Full article ">
Back to TopTop