{"title":"Technical and Legal Strategic Approaches Protecting the Privacy of Personal Data in Cloud-Based Big Data Applications","authors":"Süleyman Muhammed Arikan","doi":"10.1109/ISDFS55398.2022.9800794","DOIUrl":null,"url":null,"abstract":"As a result of the importance given to the privacy over the years, various legal arrangements and technical solutions have been provided. Thanks to studies from both perspectives, despite the development of technology, the importance given to the concept of personal data has increased day by day and has reached a level that cannot be ignored. By the way, the characteristics of data have also changed with the digital revolution, and today, big data differs from traditional data in many ways. Thus traditional methods can no longer be effective in protecting the privacy. Also, cloud computing, which provides practical solutions for problems encountered in many subjects, is frequently preferred by solution architects in big data applications, and due to the data it contains, it exposes its users to various risks within the scope of being subject to diversified violations. This situation imposes different roles and responsibilities on various stakeholders for the protection of personal data. To fulfill all these roles and responsibilities, complementary and adequate strategic approaches should be used. The aim of this study is to analyze, discuss, and provide privacy protection approaches for cloud-based big data applications. First of all, from technical and legal perspectives, examinations in cloud computing and big data have been performed separately. Then existing methods, possible technical solutions, legal requirements, and obligations are shown and discussed. Lastly, within the scope of cloud-based big data applications, additional inferences have been made and shared.","PeriodicalId":114335,"journal":{"name":"2022 10th International Symposium on Digital Forensics and Security (ISDFS)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2022-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2022 10th International Symposium on Digital Forensics and Security (ISDFS)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISDFS55398.2022.9800794","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
As a result of the importance given to the privacy over the years, various legal arrangements and technical solutions have been provided. Thanks to studies from both perspectives, despite the development of technology, the importance given to the concept of personal data has increased day by day and has reached a level that cannot be ignored. By the way, the characteristics of data have also changed with the digital revolution, and today, big data differs from traditional data in many ways. Thus traditional methods can no longer be effective in protecting the privacy. Also, cloud computing, which provides practical solutions for problems encountered in many subjects, is frequently preferred by solution architects in big data applications, and due to the data it contains, it exposes its users to various risks within the scope of being subject to diversified violations. This situation imposes different roles and responsibilities on various stakeholders for the protection of personal data. To fulfill all these roles and responsibilities, complementary and adequate strategic approaches should be used. The aim of this study is to analyze, discuss, and provide privacy protection approaches for cloud-based big data applications. First of all, from technical and legal perspectives, examinations in cloud computing and big data have been performed separately. Then existing methods, possible technical solutions, legal requirements, and obligations are shown and discussed. Lastly, within the scope of cloud-based big data applications, additional inferences have been made and shared.