Data Protection in a Post-Pandemic Society
Author | : Chaminda Hewage |
Publisher | : Springer Nature |
Total Pages | : 246 |
Release | : 2023-07-11 |
ISBN-13 | : 9783031340062 |
ISBN-10 | : 303134006X |
Rating | : 4/5 (6X Downloads) |
Download or read book Data Protection in a Post-Pandemic Society written by Chaminda Hewage and published by Springer Nature. This book was released on 2023-07-11 with total page 246 pages. Available in PDF, EPUB and Kindle. Book excerpt: This book offers the latest research results and predictions in data protection with a special focus on post-pandemic society. This book also includes various case studies and applications on data protection. It includes the Internet of Things (IoT), smart cities, federated learning, Metaverse, cryptography and cybersecurity. Data protection has burst onto the computer security scene due to the increased interest in securing personal data. Data protection is a key aspect of information security where personal and business data need to be protected from unauthorized access and modification. The stolen personal information has been used for many purposes such as ransom, bullying and identity theft. Due to the wider usage of the Internet and social media applications, people make themselves vulnerable by sharing personal data. This book discusses the challenges associated with personal data protection prior, during and post COVID-19 pandemic. Some of these challenges are caused by the technological advancements (e.g. Artificial Intelligence (AI)/Machine Learning (ML) and ChatGPT). In order to preserve the privacy of the data involved, there are novel techniques such as zero knowledge proof, fully homomorphic encryption, multi-party computations are being deployed. The tension between data privacy and data utility drive innovation in this area where numerous start-ups around the world have started receiving funding from government agencies and venture capitalists. This fuels the adoption of privacy-preserving data computation techniques in real application and the field is rapidly evolving. Researchers and students studying/working in data protection and related security fields will find this book useful as a reference.