Reyner Aranta Lika
A data tracking and monitoring mechanism
Lika, Reyner Aranta; Ramasamy, Daksha A./P V.; Murugiah, Danushyaa A./P; Brohi, Sarfraz Nawaz
Authors
Daksha A./P V. Ramasamy
Danushyaa A./P Murugiah
Sarfraz Nawaz Brohi
Contributors
Sheng-Lung Peng
Editor
Le Hoang Son
Editor
G Suseendran
Editor
D Balaganesh
Editor
Abstract
There is a rising trend among companies to collect data including personally identifiable information (PII) from service users. An individual’s privacy can be violated when his/her PII is accumulated, utilized or divulged. Users of the technology are unable to comprehend what information about them is being utilized, how, when and by whom. With this situation in mind, data transparency is an absolute necessity to combat this issue. Extensive research is being carried out to understand and address the problem. In this research, we propose a security mechanism known as D2TRacker, which can perform data monitoring and data tracking on the processes that are taken on the user’s data and ultimately provides data transparency to these service users. Through the development and execution, the results obtained showed that data transparency could be provided to the system users. Overall, this solution serves as a stepping stone in solving the issues encountered. This solution works as intended in a simulated environment, but deployment in real world would need further enhancements.
Online Publication Date | May 15, 2020 |
---|---|
Publication Date | Jan 1, 2020 |
Deposit Date | Sep 9, 2022 |
Publisher | Springer |
Pages | 773-781 |
Series Title | Lecture Notes in Networks and Systems book series (LNNS, volume 118) |
Series ISSN | 2367-3389; 2367-3370 |
Book Title | Lecture Notes in Networks and Systems book series (LNNS,volume 118) |
ISBN | 978-981-15-3283-2 |
DOI | https://doi.org/10.1007/978-981-15-3284-9_89 |
Keywords | Networks, Systems, networks and Systems, Data Science, Intelligent Computing, Data Tracking, data monitering |
Public URL | https://uwe-repository.worktribe.com/output/9940944 |
Publisher URL | https://link.springer.com/chapter/10.1007/978-981-15-3284-9_89 |
Related Public URLs | https://www.springer.com/series/15179 |
You might also like
UAV’s applications, architecture, security issues and attack scenarios: A survey
(2020)
Book Chapter
A three-level ransomware detection and prevention mechanism
(2020)
Journal Article
Identifying and analyzing the transient and permanent barriers for big data
(2016)
Journal Article
Downloadable Citations
About UWE Bristol Research Repository
Administrator e-mail: repository@uwe.ac.uk
This application uses the following open-source libraries:
SheetJS Community Edition
Apache License Version 2.0 (http://www.apache.org/licenses/)
PDF.js
Apache License Version 2.0 (http://www.apache.org/licenses/)
Font Awesome
SIL OFL 1.1 (http://scripts.sil.org/OFL)
MIT License (http://opensource.org/licenses/mit-license.html)
CC BY 3.0 ( http://creativecommons.org/licenses/by/3.0/)
Powered by Worktribe © 2025
Advanced Search