Data Behind the Walls An Advanced Architecture for Data Privacy Management

Amen Faridoon,M. Tahar Kechadi
DOI: https://doi.org/10.48550/arXiv.2307.06779
2023-07-13
Abstract:In today's highly connected society, we are constantly asked to provide personal information to retailers, voter surveys, medical professionals, and other data collection efforts. The collected data is stored in large data warehouses. Organisations and statistical agencies share and use this data to facilitate research in public health, economics, sociology, etc. However, this data contains sensitive information about individuals, which can result in identity theft, financial loss, stress and depression, embarrassment, abuse, etc. Therefore, one must ensure rigorous management of individuals' privacy. We propose, an advanced data privacy management architecture composed of three layers. The data management layer consists of de-identification and anonymisation, the access management layer for re-enforcing data access based on the concepts of Role-Based Access Control and the Chinese Wall Security Policy, and the roles layer for regulating different users. The proposed system architecture is validated on healthcare datasets.
Cryptography and Security
What problem does this paper attempt to address?
The main problem this paper attempts to address is personal data privacy management and data security issues. Specifically, with the highly interconnected society and the widespread collection of personal information, how to ensure that data can be effectively utilized while preventing the leakage of personal sensitive information, avoiding risks such as identity theft, economic loss, psychological pressure, embarrassment, and abuse. To this end, the author proposes an advanced data privacy management architecture aimed at addressing these issues through the following ways: 1. **Creating Secure Isolation**: Constructing a three-layer data privacy management architecture, including the data management layer, access management layer, and role layer, to achieve effective isolation and control of data. 2. **Enhancing Access Control**: Combining Role-Based Access Control (RBAC) and Chinese Wall Security Policy (CWSP) to ensure that only authorized users can access specific data objects and to prevent internal threats and external attacks. 3. **Protecting Personal Privacy**: Reducing the sensitivity of data by de-identifying and anonymizing the original data to prevent re-identification of personal identities through data analysis. Through these measures, the architecture aims to provide secure and reliable data support for research in fields such as healthcare, economics, and sociology, while protecting personal privacy from infringement.