Enhancing Confidentiality and Privacy of Data in Motion from Embedded Systems
Downloads
Data has become the new “oil” and is a drive for the knowledge based digital economy. Like any asset of a value, data has numerous security related challenges associated with its integrity, confidentiality and availability. Furthermore, emerging computing paradigms such as cloud and grid computing are enlarged the physical foot print of data in a given system, hence creating new challenges associated to data security. The new computing technologies such as wireless sensor networks and their applications in various fields present new challenges associated with Data Confidentiality and Privacy. Thus, this study aimed at improving confidentiality and Privacy of data in motion in wireless Vehicle Sensors.
The study used design science philosophy and applied inductive research strategy, since it aims at providing a solution to an issue in a unique domain whose problem and solution are entwined. To address objectives one, a mixed methods approach was used that involved both qualitative and quantitative methods of data collection and analysis. The design of the framework was modeled using a Unified Modeling Language. The research revealed that there is existence of data from the embedded systems used without clients’ consent. It was also revealed that enhancing confidentiality and privacy of data in motion in embedded systems save organizations from financial loss. The study identified several major weaknesses and vulnerabilities in existing frameworks, including lack of end user awareness, cyber threats, breaches in data in motion, gaps in data frameworks, human errors, limited knowledge and access to data frameworks, insecure file sharing, and potential malicious actions or third-party infiltration. Basing on the above findings, a framework to enhance confidentiality and privacy of data in motion was designed.
The framework proposed herein, creates a robust shield around data, elevating security standards and instilling trust in the system's ability to safeguard sensitive information. Through meticulous attention to authorization, consent management, integrity verification, and abuse detection, the framework stands poised to elevate data security standards and foster trust in the system's ability to safeguard sensitive information. The study findings suggest that the framework for enhancing confidentiality and privacy of data in motion is perceived as effective and efficient by the respondents. This positive feedback underscores the importance of using the ECPDM framework to safeguard embedded data in motion.
Abdel Hakeem, S. A., Hussein, H. H., & Kim, H. (2022). Security requirements and challenges of 6G technologies and applications. Sensors, 22(5), 1969.
Abdiakhmetova, Z., Temirbekova, Z., & Turken, G. (2023). Intelligent Monitoring System Based on ATmega Microcontrollers in Healthcare with Stress Reduce Effect. In Computational Methods in Psychiatry (pp. 51-71). Singapore: Springer Nature Singapore.
Adler, P., & Florida, R. (2021). The rise of urban tech: how innovations for cities come from cities. Regional Studies, 55(10-11), 1787-1800.
African Union (2020). The Digital Transformation Strategy for Africa (2020-30).
Aggrey, O., & Evarist, N. (2019). Survey of Crowd Detection Algorithms using Wireless Sensor Networks: A Case of People Crowds. Article in International Journal of Computer Applications, 182(38), 975–8887. https://doi.org/10.5120/ijca2019918383
Agrawal, S., Schuster, A. M., Britt, N., Mack, E. A., Tidwell, M. L., & Cotten, S. R. (2023). Building on the past to help prepare the workforce for the future with automated vehicles: A systematic review of automated passenger vehicle deployment timelines. Technology in Society, 72, 102186.
Abaho, E. (2017). Advancing Transportation in Uganda with Automation, Connectivity and Intelligence. Kampala: MUK (Dissertation)
William, A., Mirembe (PhD), D. D. P., & Nabaasa (PhD), D. E. (2022). Data Privacy Analysis on E-commerce Application. International Journal of Technology and Management, 7(2), 1-29. Retrieved from https://www.utamu.ac.ug/ijotm/index.php/ijotm/article/view/105
Barecki, B. (2019). How to Protect Data in Motion. Confidentiality and Privacy of Data. 3rd edition. Los Angeles, Sage.
Ettredge, M., Guo, F., & Li, Y. (2018). Trade secrets and cyber security breaches. Journal of Accounting and Public Policy, 37(6), 564–585. https://doi.org/10.1016/J.JACCPUBPOL.2018.10.006
William, A., Mirembe (PhD), D., & Nabaasa (PhD), E. (2023). Reducing Misuse of Data in Motion through Surveillance of Logs. International Journal of Technology and Management, 8(1), 1-10. Retrieved from http://utamu.ac.ug/ijotm/index.php/ijotm/article/view/108
Haber, M. J., & Rolls, D. (2020). Identity Attack Vectors. In Identity Attack Vectors (pp. 107–116). Apress. https://doi.or/978-1-4842-5165-2_10Hadoop. (n.d.).
Katushabe, B.W. (2021). Benefits of GPS Tracking Devices for Personal Vehicles. Kampala. (KIU Dissertation). Unpublished.
Kagita, M. K., Thilakarathne, N., Rajput, D. S., & Lanka, D. S. (2020). A Detail Study of Security and Privacy issues of Internet of Things. http://arxiv.org/abs/2009.06341
Krejcie, R.V. & Morgan, D.W. (1970). Determining Sample Size for Research Activities. Educational and Psychological Measurement.
Lu, Y., & Xu, L. Da. (2019). Internet of things (IoT) cybersecurity research: A review of current research topics. IEEE Internet of Things Journal, 6(2), 2103–2115. https://doi.org/10.1109/JIOT.2018.2869847
Manickam, P., Shankar, K., Perumal, E., Ilayaraja, M., & Kumar, K. S. (2019). Secure data transmission through reliable vehicles in vanet using optimal lightweight cryptography. In Advanced Sciences and Technologies for Security Applications. Springer. https://doi.org/10.1007/978-3-030-16837-7_9
Mukasa, D. (2021). A GPS Tracker on Every ‘Boda Boda’: A Tale of Mass Surveillance in Uganda. Kampala. Unwanted Witnesses.
Oppitz, M., & Tomsu, P. (2018). Security and Privacy Challenges. In Inventing the Cloud Century (Vol. 6, Issue 1, pp. 377–410). https://doi.org/10.1007/978-3-319-61161-7_14
Wlosinski, L. G. (2018). Data Loss Prevention — Next Steps. ISACA Journal, 1, 1–11. https://www.isaca.org/-/media/files/isacadp/project/isaca/articles/journal/2018/volume-1/data-loss-prevention-next-steps_joa_eng_0218
Copyright (c) 2024 Ahamya William, Drake Mirembe, Evarist Nabaasa
This work is licensed under a Creative Commons Attribution 4.0 International License.
All Content should be original and unpublished.