Privacy and Anonymity

Authors

  • Dayakar Siramgari. Laxminarayana Korada

Keywords:

Privacy, Anonymity, Surveillance Capitalism, Data Protection, Differential Privacy, Encryption, GDPR, Cybersecurity, Federated Learning, Blockchain

Abstract

In the digital era, privacy and anonymity are becoming increasingly crucial because of widespread monitoring and data collection by corporations and governments. This study examines the ethical, legal, and technological aspects of privacy and anonymity, particularly in relation to surveillance capitalism, commodification of personal data, and individuals' expectations of privacy. It discusses the distinction between privacy and anonymity, highlighting the need for privacy-preserving measures such as encryption, differential privacy, and anonymization techniques. Additionally, this study explores the challenges associated with privacy, such as data re-identification risks, and reviews technological solutions, including end-to-end encryption, federated learning, and blockchain. The study also covers regulatory frameworks such as the GDPR, evaluates privacy-preserving technologies, and analyzes the ethical balance between privacy rights and security needs. Real-world applications and case studies illustrate the implementation of privacy mechanisms in various industries, emphasizing the importance of privacy and anonymity protection to uphold individual rights in data-driven landscapes.

Downloads

Download data is not yet available.

References

Acquisti, A., Brandimarte, L., & Loewenstein, G. (2015). Privacy and human behavior in the age of information. Science, 347(6221), 509-514.

Bygrave, L. A. (2014). Data privacy law: an international perspective. Oxford University Press.

Chaum, D. L. (1981). Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM, 24(2), 84-90.

Dwork, C. (2006, July). Differential privacy. In the International colloquium on automata, languages and programming (pp. 1-12). Berlin, Heidelberg: Springer Berlin Heidelberg.

Lyon, D. (2015). Surveillance after Snowden. John Wiley & Sons.

Narayanan, A., & Shmatikov, V. (2010). Myths and fallacies of ‘personally identifiable information.’ Communications of the ACM, 53(6), 24-26.

NHS Digital. (2018, June 28). Cyber security boost to the NHS as NHS Digital joins forces with IBM. https://digital.nhs.uk/cyber-and-data-security/cyber-security-news/cyber-security-boost-to-the-nhs-as-nhs-digital-joins-forces-with-ibm

Nissenbaum, H. (2011). Privacy in context: Technology, policy, and the integrity of social life. Journal of Information Policy, 1, 149-151.

Pfitzmann, A., & Hansen, M. (2010). A terminology for talking about privacy by data minimization: Anonymity, unlinkability, undetectability, unobservability, pseudonymity, and identity management.

Regan, P. M. (1995). Legislating privacy: Technology, social values and public policy.

S, V. V. (2019, July). OKTA Identity and Access Management. Mindmajix. https://mindmajix.com/okta-identity-and-access-management

Schwartz, M. J. (2014, January 13). Neiman Marcus, Target data breaches: 8 facts. Dark Reading. Retrieved from https://www.darkreading.com/cyberattacks-data-breaches/neiman-marcus-target-data-breaches-8-facts

Seale, J., & Schoenberger, N. (2018). Be Internet awesome: a critical analysis of Google’s child-focused Internet safety program. Emerging Library & Information Perspectives, 1, 34–58. https://doi.org.10.5206/elip.v1i1.366

Solove, D. J. (2010). Understanding privacy. Harvard university press.

Zuboff, S. (2015). Big other: surveillance capitalism and the prospects of an information civilization. Journal of information technology, 30(1), 75-89.

Downloads

Published

25.12.2019

How to Cite

Dayakar Siramgari. (2019). Privacy and Anonymity. International Journal of Intelligent Systems and Applications in Engineering, 7(4), 255–265. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/7106

Issue

Section

Research Article