Security, Privacy Research Issues in Various
Security, Privacy Research Issues in Various
4
Machine Intelligence Research Labs (MIR Labs),
Scientific Network for Innovation and Research Excellence, Auburn, Washington 98071, USA
[email protected]
Abstract: Security and Privacy (S&P) preserved systems play can be ensured [1, 3]. Privacy and Security are two
an important role in decision support for Internet-mediated integrated issues (important) in the deployment of every
service provision. It is essential (need to be mandatory) to technology (require with data, i.e., data need to be secured
enable systems/ users to represent and update their security and confidentially during data transfer) or network.
and maintain privacy with other peers (systems, in open
networks) for sharing files, and especially to accessing reliable Security is the degree of confrontation or protective nature
services in computing/ real world scenarios. Privacy and from destruction, valuable goods, humans, nation, institution,
security concerns are highly critical one and required efficient etc. On the contrary, privacy refers to “masking oneself from
solution from research communities (working in different others” [1], i.e., securing our personal details, location, etc.
domains/ disciplines around the world). The motto of this very
from illegal access or rather, privacy refers to the certain
article is to provide apprehensive and rightful information
about the existing security and privacy issues, approaches, information which everyone would like to keep in incognito
hurdles, etc. in a plethora of platforms to enhance the data mode of theirs. For example, in a vehicular ad-hoc network,
quality in the corresponding processing department. Note that user’s privacy is important while communicating with other
among several issues like trust, efficiency, scalability, security, users and also with infrastructure, a user always worry about
complexity, etc., especially security and privacy issues (in their personal data and their location. Moreover these issues
various computing platforms) have been discussed in this work. trust issue also comes into picture in computing environment,
The review methodology has led to the successful revelations of but this article is more focused towards security and privacy
the major challenges and necessities for safe and secure privacy issue only. The difference between privacy and security have
in real time.
discussed (in detail) in [1, 2].
Keywords: Security, Privacy, Trust, Computing Environment, Hence, the organization (remaining part) of this
Computer Science. work is followed as: Section 2 discusses about motivation
related to this work. Then from section 3 to 14, this work
discusses various security and privacy issues in various
computing platforms, starting from Big Data to Blockchain
I. INTRODUCTION technology. And in last, we conclude this work (in brief)
with some future enhancements (needed to be done in near
Security is a human right and need to be provided future) in section 15.
in all situations to client/ user/ system in this smart era (to
electronic frameworks). On another side, privacy is required II. MOTIVATION
to be maintained for communicated or collected data (data in
motion and data at rest). Privacy and Security have different It is a mandating fact that human rights, which
meaning but they are inseparably related. Security can both includes privacy, are to be preserved and secured when users
be an ally and an enemy to privacy. Though privacy and interact and converse with each other on a computing
security seem to complement each other, privacy has a platform. We noticed that, with privacy, trust also an
socialistic perspective while security has a technical essential component in several computing platforms like
approach. The relationship between them is that the security Vehicular Ad-hoc Network (VANET), Cloud Computing [5],
technologies might provide mechanisms by which privacy Grid Computing, Blockchain [29], etc. [11]. Authors in [10]
have proven that privacy is indeed a factor that drives trust
MIR Labs, USA
2 Tyagi et al.
and loyalty without the direct interaction between privacy to build. For explaining trust, several metrics, measurement
and the users’ manners (trust). Security is also dependent on are required to discuss in each computing environment,
Trust component (e.g., in case of insider attack, any security which will make this article difficult to read (and project).
mechanism fails). On the whole, trust leads to a number of So, authors will try to give trust concerns in various
definitions as it is completely based on context and the topic computing environment in separate article (work) in near
in consideration (e.g. ethics and values, computing sciences, future. With this survey, we will get to know that there is not
socio-economics, etc.) [10]. Trust is based on beliefs, faith a single approach/ trustworthy method which can provide/
and takes years to build. Once it is lost, hard to gain/ recover overcome these two issues (security and privacy) in the
[10]. It is necessary for users to trust the Recommendation respective computing platforms. In summary, there are
and Reputation (R&R) [12] schemes before R&R can play a several areas where security and privacy issues are rising
role in informing users ‘trust perception. It is to be noted that with a higher growth. And not much research work has been
location privacy and trust, both equally demand for done with respect to some applications/ areas like grid
interactions, usage of personal info and details, computation computing, future vehicular network, and Blockchain
and analysis, etc. But, when we make a survey on several technology, etc. So, we require a lot of research objectives/
computing platforms, then we find that Security, Privacy and directions/ issues and challenges (also research gaps in
Trust are highly critical concerns in the past decade [1]. current scenarios) to be solved by future researchers with
Security and Privacy are highly essential for every respect to respective computing platforms. Hence, this result
computing platform/ environment, for example, transfer provides us a primary motivation to do innovative work in
information needed to be secured with good encryption several areas. These emerging factors force us to write this
algorithm and needed to be kept confidential along the ways/ work/ paper. Now this section onwards, we will discuss
network/ channel/ in system. So, we used (explained) these several security and privacy issues in several computing
two issues “security and privacy” to discuss in each and platforms (as future research directions) in detail. Also, a
every computing platforms. Note that we could not consider brief comparison about security, privacy and trust issues is
trust concerns here (in this work) because trust belongs to discussed in table 1.
belief, faith, etc., and require a lot of time (also interaction)