A Synergistic Approach to Digital Privacy

by   Christopher Gorog, et al.

This paper outlines an approach for IEEE to take leadership for digital privacy to align many existing IEEE Societies and efforts in the areas of computer systems applications security, organizational global architectures, policy-supporting legislation, originating new standards, integrating compliance into technologies, and helping design decision-board infrastructures for governance bodies. Much of the current emphasis on evolving privacy technologies centers on big corporate enterprises and institutions, causing the industry to support corporate assets protection mainly. Fostering technology to empower individual privacy-enabling tools has lagged, and personal privacy has diminished because corporate big data applications have made sizable investments into exploiting private data. As one of the largest individual-member-based organizations, IEEE is urged to develop a collaborative approach for digital privacy with privacy-enabling technologies to benefit its members. The recommendations outlined define a prospective course that could result in future global individualized privacy capabilities which employ a combination of synergistic technologies such as distributed ledgers, differential privacy, homomorphic encryption, secure distributed multi-party computation, zero-trust architectures, proof-of-origin of data, software, or other techniques. Such an effort would involve community engagement and outreach, academic peer-review events, the establishment of governance bodies, coordination expansion of existing standards, and the development of publicly-accessible prototypes. Collaboration with other IEEE-sponsored efforts for transactive energy systems, confidentiality and security of healthcare records and devices, and other IEEE-funded projects will help magnify digital privacy investments already in progress in these applications of emerging technologies.



There are no comments yet.


page 1

page 2

page 3

page 4


A survey on Blockchain-based applications for reforming data protection, privacy and security

The modern society, economy and industry have been changed remarkably by...

Evaluating Medical IoT (MIoT) Device Security using NISTIR-8228 Expectations

How do healthcare organizations (from small Practices to large HDOs) eva...

Differential Privacy Techniques for Cyber Physical Systems: A Survey

Modern cyber physical systems (CPSs) has widely being used in our daily ...

Revolutionizing Medical Data Sharing Using Advanced Privacy Enhancing Technologies: Technical, Legal and Ethical Synthesis

Multisite medical data sharing is critical in modern clinical practice a...

A Review on Cybersecurity in Smart Local Energy Systems: Requirements, Challenges, and Standards

Smart local energy system (SLES) is considered as a promising pathway fa...

Decentralised Trust for the Digital Economy

We propose a research initiative to explore and evaluate end-user techno...

Analysis of Digital Sovereignty and Identity: From Digitization to Digitalization

Advances in emerging technologies have accelerated digital transformatio...
This week in AI

Get the week's most popular data science and artificial intelligence research sent straight to your inbox every Saturday.