Abstract
The upcoming Beyond 5G (B5G) and 6G networks are expected to provide enhanced capabilities such as ultra-high data rates, dense connectivity, and high scalability. It opens many possibilities for a new generation of services driven by Artificial Intelligence (AI) and billions of interconnected smart devices. However, with this expected massive upgrade, the privacy of people, organisations, and states is becoming a rising concern. The recent introduction of privacy laws and regulations for personal and non-personal data signals that global awareness is emerging in the current privacy landscape. Yet, many gaps need to be identified in the case of two data types. If not detected, they can lead to significant privacy leakages and attacks that will affect billions of people and organisations who utilise B5G/6G. This survey is a comprehensive study of personal and non-personal data privacy in B5G/6G to identify the current progress and future directions to ensure data privacy. We provide a detailed comparison of the two data types and a set of related privacy goals for B5G/6G. Next, we bring data privacy issues with possible solutions. This paper also provides future directions to preserve personal and non-personal data privacy in future networks.
- Anutusha Dogra, Rakesh Kumar Jha, and Shubha Jain. 2020. A survey on beyond 5G network with the advent of 6G: Architecture and emerging technologies. IEEE Access 9(2020), 67512–67547.Google ScholarCross Ref
- William Stallings and Mohit P Tahiliani. 2014. Cryptography and network security: principles and practice, vol. 6. (2014).Google Scholar
- Rossouw Von Solms and Johan Van Niekerk. 2013. From information security to cyber security. computers & security 38 (2013), 97–102.Google Scholar
- Pablo Benlloch-Caballero, Qi Wang, and Jose M Alcaraz Calero. 2023. Distributed dual-layer autonomous closed loops for self-protection of 5G/6G IoT networks from distributed denial of service attacks. Computer Networks 222(2023), 109526.Google ScholarDigital Library
- Jingwen Zhang, Jiale Zhang, Junjun Chen, and Shui Yu. 2020. Gan enhanced membership inference: A passive local attack in federated learning. In ICC 2020-2020 IEEE International Conference on Communications (ICC). IEEE, 1–6.Google ScholarCross Ref
- Ligeng Zhu, Zhijian Liu, and Song Han. 2019. Deep leakage from gradients. Advances in neural information processing systems 32 (2019).Google Scholar
- Pawani Porambage, Gürkan Gür, Diana Pamela Moya Osorio, Madhusanka Liyanage, Andrei Gurtov, and Mika Ylianttila. 2021. The roadmap to 6G security and privacy. IEEE Open Journal of the Communications Society (2021).Google Scholar
- Yang Zhao, Wenchao Zhai, Jun Zhao, Tinghao Zhang, Sumei Sun, Dusit Niyato, and Kwok-Yan Lam. 2020. A comprehensive survey of 6g wireless communications. arXiv preprint arXiv:2101.03889(2020).Google Scholar
- Amin Shahraki, Mahmoud Abbasi, Md Piran, Mingzhe Chen, Shuguang Cui, et al. 2021. A comprehensive survey on 6g networks: Applications, core services, enabling technologies, and future challenges. arXiv:2101.12475 (2021).Google Scholar
- Chamitha D A, Anshuman K, Quoc-Viet P, K, et al. 2021. Survey on 6G Frontiers: Trends, Applications, Requirements, Technologies and Future Research. IEEE Open Journal of the Communications Society (2021).Google Scholar
- Tongyi Huang, Wu Yang, Jun Wu, Jin Ma, Xiaofei Zhang, and Daoyin Zhang. 2019. A survey on green 6G network: Architecture and technologies. IEEE Access 7(2019), 175758–175768.Google ScholarCross Ref
- Yang Lu and Xianrong Zheng. 2020. 6G: A survey on technologies, scenarios, challenges, and the related issues. Journal of Industrial Information Integration (2020), 100158.Google Scholar
- Chamara Sandeepa, B Siniarski, Nicolas Kourtellis, Shen Wang, and Madhusanka Liyanage. 2022. A survey on privacy for B5G/6G: New privacy challenges, and research directions. Journal of Industrial Information Integration (2022).Google Scholar
- Van-Linh Nguyen, Po-Ching Lin, Bo-Chao Cheng, Ren-Hung Hwang, and Ying-Dar Lin. 2021. Security and privacy for 6G: A survey on prospective technologies and challenges. IEEE Communications Surveys & Tutorials(2021).Google Scholar
- Minghao Wang, Tianqing Zhu, Tao Zhang, Jun Zhang, Shui Yu, and Wanlei Zhou. 2020. Security and privacy in 6G networks: New areas and new challenges. Digital Communications and Networks 6, 3 (2020), 281–291.Google ScholarCross Ref
- Yuanyuan Sun, Jiajia Liu, Jiadai Wang, Yurui Cao, and Nei Kato. 2020. When machine learning meets privacy in 6G: A survey. IEEE Communications Surveys & Tutorials 22, 4 (2020), 2694–2724.Google ScholarCross Ref
- Bomin Mao, Jiajia Liu, Yingying Wu, and Nei Kato. 2023. Security and Privacy on 6G Network Edge: A Survey. IEEE Communications Surveys & Tutorials(2023).Google ScholarDigital Library
- Michèle Finck and Frank Pallas. 2020. They who must not be identified—distinguishing personal from non-personal data under the GDPR. International Data Privacy Law(2020).Google Scholar
- Matti Latva-aho. 2018. Radio access networking challenges towards 2030. Powerpoint Presentation, Oulu University, Finland, October (2018).Google Scholar
- Guangyi Liu, Yuhong Huang, Na Li, Jing Dong, Jing Jin, Qixing Wang, and Nan Li. 2020. Vision, requirements and network architecture of 6G mobile network beyond 2030. China Communications 17, 9 (2020), 92–104.Google ScholarCross Ref
- Helin Yang, Arokiaswami Alphones, Zehui Xiong, Dusit Niyato, Jun Zhao, and Kaishun Wu. 2020. Artificial-intelligence-enabled intelligent 6G networks. IEEE Network 34, 6 (2020), 272–280.Google ScholarDigital Library
- Ozgur et al. Akgul. 2023. Deliverable D3.2 initial architectural enablers - hexa-X-II.EU. (Oct 2023). https://hexa-x-ii.eu/wp-content/uploads/2023/11/Hexa-X-II_D3.2_v1.0.pdfGoogle Scholar
- Solmaz Niknam, Abhishek Roy, et al. 2022. Intelligent O-RAN for beyond 5G and 6G wireless networks. In IEEE Globecom Workshops (GC Wkshps). IEEE.Google ScholarCross Ref
- Xueli An, Jianjun Wu, Wen Tong, Peiying Zhu, and Yan Chen. 2021. 6G Network Architecture Vision. In 2021 Joint European Conference on Networks and Communications & 6G Summit (EuCNC/6G Summit). IEEE, 592–597.Google ScholarCross Ref
- Yong Xiao, Guangming Shi, Yingyu Li, Walid Saad, and H Vincent Poor. 2020. Toward self-learning edge intelligence in 6G. IEEE Communications Magazine 58, 12 (2020), 34–40.Google ScholarCross Ref
- Madhusanka Liyanage, Quoc-Viet Pham, Kapal Dev, Sweta Bhattacharya, et al. 2022. A survey on Zero touch network and Service (ZSM) Management for 5G and beyond networks. Journal of Network and Computer Applications (2022).Google Scholar
- Yiming Wei, Mugen Peng, and Yaqiong Liu. 2020. Intent-based networks for 6G: Insights and challenges. Digital Communications and Networks 6, 3 (2020), 270–280.Google ScholarCross Ref
- 2018. Art. 4 GDPR – Definitions. (Mar 2018). https://gdpr-info.eu/art-4-gdpr/ last accessed on 12 Dec 2023.Google Scholar
- Elvia Arcelia Quintana Adriano. 2015. The natural person, legal entity or juridical person and juridical personality. Penn St. JL & Int’l Aff. 4 (2015), 363.Google Scholar
- Stylianos Mystakidis. 2022. Metaverse. Encyclopedia 2, 1 (2022), 486–497.Google ScholarCross Ref
- Reza Shokri, Marco Stronati, Congzheng Song, and Vitaly Shmatikov. 2017. Membership inference attacks against machine learning models. In 2017 IEEE symposium on security and privacy (SP). IEEE, 3–18.Google ScholarCross Ref
- Zhibo Wang, Yuting Huang, Mengkai Song, Libing Wu, Feng Xue, and Kui Ren. 2022. Poisoning-assisted property inference attack against federated learning. IEEE Transactions on Dependable and Secure Computing (2022).Google ScholarDigital Library
- REGULATION (EU) 2018/1807 OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL. ([n. d.]). https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=CELEX%3A32018R1807Google Scholar
- Jeeyun Sophia Baik. 2020. Data privacy against innovation or against discrimination?: The case of the California Consumer Privacy Act (CCPA). Telematics and Informatics 52 (2020).Google Scholar
- California Consumer Privacy Act (CCPA). ([n. d.]). https://oag.ca.gov/privacy/ccpa last accessed on 29 Nov 2023.Google Scholar
- What is not ‘personal information’?([n. d.]). https://www.alrc.gov.au/publication/for-your-information-australian-privacy-law-and-practice-alrc-report-108/6-the-privacy-act-some-important-definitions/what-is-not-personal-information/ last accessed on December 30, 2023.Google Scholar
- Review of Australian Privacy Law [2007] ALRCDP 72. ([n. d.]). 'http://www6.austlii.edu.au/cgi-bin/viewdoc/au/other/lawreform/ALRCDP/2007/72.html' last accessed on December 20, 2023.Google Scholar
- Laura Somaini. 2020. Regulating the Dynamic Concept of Non-Personal Data in the EU: From Ownership to Portability. Eur. Data Prot. L. Rev.(2020).Google Scholar
- Jeannette M Wing. 2019. The data life cycle. Harvard Data Science Review 1, 1 (2019), 6.Google Scholar
- Wan Siti Halimatul Munirah Wan Ahmad, Nurul Asyikin Mohamed Radzi, FS Samidi, et al. 2020. 5G technology: Towards dynamic spectrum sharing using cognitive radio networks. IEEE Access (2020).Google Scholar
- Mohamed Grissa, Attila Altay Yavuz, and Bechir Hamdaoui. 2019. Location privacy in cognitive radios with multi-server private information retrieval. IEEE Transactions on Cognitive Communications and Networking 5, 4(2019), 949–962.Google ScholarCross Ref
- Jianjun Wu, Rongpeng Li, Xueli An, C Peng, Zhe Liu, Jon Crowcroft, and Honggang Zhang. 2021. Toward native artificial intelligence in 6G networks: System design, architectures, and paradigms. arXiv preprint arXiv:2103.02823(2021).Google Scholar
- Wei Yang Bryan Lim, Luong, et al. 2020. Federated learning in mobile edge networks: A comprehensive survey. IEEE Communications Surveys & Tutorials(2020).Google Scholar
- Yousaf Bin Zikria, Rashid Ali, Muhammad Khalil Afzal, and Sung Won Kim. 2021. Next-generation internet of things (iot): Opportunities, challenges, and solutions. Sensors 21, 4 (2021), 1174.Google ScholarCross Ref
- Ajay Kakkar. 2020. A survey on secure communication techniques for 5G wireless heterogeneous networks. Information Fusion (2020).Google Scholar
- Adrienn Lukács. 2016. What is privacy? The history and definition of privacy. SZTE Repository of Publications(2016).Google Scholar
- 2019. A guide to GDPR data privacy requirements. (Feb 2019). https://gdpr.eu/data-privacy/ last accessed on 10 Nov 2023.Google Scholar
- Ken Barker, Mina Askari, Mishtu Banerjee, Kambiz Ghazinour, Brenan Mackas, Maryam Majedi, Sampson Pun, and Adepele Williams. 2009. A data privacy taxonomy. In British National Conference on Databases. Springer, 42–54.Google ScholarDigital Library
- Daniel J Solove. 2005. A taxonomy of privacy. U. Pa. L. Rev. 154(2005), 477.Google ScholarCross Ref
- Md Atiqur Rahman, Tanzila Rahman, Robert Laganière, Noman Mohammed, and Yang Wang. 2018. Membership Inference Attack against Differentially Private Deep Learning Model.Trans. Data Priv. 11, 1 (2018), 61–79.Google Scholar
- Zhiyi Tian, Lei Cui, Jie Liang, and Shui Yu. 2022. A comprehensive survey on poisoning attacks and countermeasures in machine learning. Comput. Surveys 55, 8 (2022), 1–35.Google ScholarDigital Library
- Madhusanka Liyanage, Jukka Salo, An Braeken, Tanesh Kumar, Suranga Seneviratne, and Mika Ylianttila. 2018. 5G privacy: Scenarios and solutions. In 2018 IEEE 5G World Forum (5GWF). IEEE, 197–203.Google Scholar
- Dinh C Nguyen, Ming Ding, Pubudu N Pathirana, Aruna Seneviratne, Jun Li, Dusit Niyato, Octavia Dobre, and H Vincent Poor. 2021. 6G Internet of Things: A comprehensive survey. IEEE Internet of Things Journal(2021).Google Scholar
- Francesca Meneghello, Matteo Calore, Daniel Zucchetto, Michele Polese, and Andrea Zanella. 2019. IoT: Internet of threats? A survey of practical security vulnerabilities in real IoT devices. IEEE Internet of Things Journal 6, 5 (2019), 8182–8201.Google ScholarCross Ref
- Miao Du, Kun Wang, Yuanfang Chen, Xiaoyan Wang, and Yanfei Sun. 2018. Big data privacy preserving in multi-access edge computing for heterogeneous Internet of Things. IEEE Communications Magazine 56, 8 (2018), 62–67.Google ScholarDigital Library
- Kristin Aleksandrova. 2021. The Right to Erasure and its Implication on AAL Systems. In Proceedings of the Information Systems and Grid Technologies.Google Scholar
- J Connolly. 2021. The right to erasure: Comparative perspectives on an emerging privacy right. Alternative Law (2021).Google Scholar
- Tiago Sergio Cabral. 2020. Forgetful AI: AI and the Right to Erasure under the GDPR. Eur. Data Prot. L. Rev. 6 (2020), 378.Google ScholarCross Ref
- Viraaji Mothukuri, Reza M Parizi, Seyedamin Pouriyeh, Yan Huang, Ali Dehghantanha, and Gautam Srivastava. 2021. A survey on security and privacy of federated learning. Future Generation Computer Systems 115 (2021), 619–640.Google ScholarCross Ref
- Muhammad Mudassar Yamin, Mohib Ullah, Habib Ullah, and Basel Katt. 2021. Weaponized AI for cyber attacks. Journal of Information Security and Applications 57 (2021), 102722.Google ScholarCross Ref
- Anli Yan, Ruitao Hou, Xiaozhang Liu, Hongyang Yan, Teng Huang, and Xianmin Wang. 2022. Towards explainable model extraction attacks. International Journal of Intelligent Systems 37, 11(2022), 9936–9956.Google ScholarDigital Library
- Jinyuan Jia, Ahmed Salem, et al. 2019. Memguard: Defending against black-box membership inference attacks via adversarial examples. In ACM SIGSAC conference on computer and communications security.Google ScholarDigital Library
- Marcin Rojszczak. 2020. Does global scope guarantee effectiveness? Searching for a new legal standard for privacy protection in cyberspace. Information & Communications Technology Law 29, 1 (2020), 22–44.Google ScholarCross Ref
- Christian Peukert, Stefan Bechtold, Michail Batikas, and Tobias Kretschmer. 2020. European privacy law and global markets for data. Available at SSRN 3560392(2020).Google Scholar
- J. A Shamsi and M. Ali Khojaye. 2018. Understanding privacy violations in big data systems. It Professional (2018).Google Scholar
- Chafika Benzaid and Tarik Taleb. 2020. AI-driven zero touch network and service management in 5G and beyond: Challenges and research directions. IEEE Network 34, 2 (2020), 186–194.Google ScholarCross Ref
- Graham Greenleaf. 2019. Global data privacy laws 2019: 132 national laws & many bills. Privacy Laws and Business International Report (2019).Google Scholar
- Eric Goldman. 2020. An introduction to the california consumer privacy act. Santa Clara Univ. Legal Studies Research(2020).Google Scholar
- Shui Yu. 2016. Big privacy: Challenges and opportunities of privacy study in the age of big data. IEEE access (2016).Google Scholar
- Priyank Jain, Manasi Gyanchandani, and Nilay Khare. 2016. Big data privacy: a technological perspective and review. Journal of Big Data 3, 1 (2016), 1–25.Google ScholarCross Ref
- Heng Zhang, Yuanchao Shu, Peng Cheng, and Jiming Chen. 2016. Privacy and performance trade-off in cyber-physical systems. IEEE Network 30, 2 (2016), 62–66.Google ScholarDigital Library
- Roy Dong, Lillian J Ratliff, Alvaro A Cárdenas, Henrik Ohlsson, and S Shankar Sastry. 2018. Quantifying the Utility–Privacy Tradeoff in the Internet of Things. ACM Transactions on Cyber-Physical Systems 2, 2 (2018), 1–28.Google ScholarDigital Library
- Erin Egan. 2019. Data Portability and Privacy. (2019).Google Scholar
- Data Transfer Project. ([n. d.]). https://datatransferproject.dev/documentation last accessed on 15 Nov 2023.Google Scholar
- Sophie Kuebler-W, Robert Luzsa, J. Kranz, S. Mager, Emmanuel Syrmoudis, Susanne Mayr, and Jens Grossklags. 2021. The Right to Data Portability: conception, status quo, and future directions. Informatik Spektrum(2021).Google Scholar
- Cynthia Dwork, Adam Smith, Thomas Steinke, and Jonathan Ullman. 2017. Exposed! a survey of attacks on private data. Annu. Rev. Stat. Appl 4, 1 (2017), 61–84.Google ScholarCross Ref
- J. Wang, L. Wu, S. Zeadally, M. Khan, and D. He. 2021. Privacy-preserving data aggregation against malicious data mining attack for IoT-enabled smart grid. ACM Transactions on Sensor Networks (TOSN)(2021).Google Scholar
- Mohamed Elhoseny, Navod Neranjan Thilakarathne, Mohammed I Alghamdi, Rakesh Kumar Mahendran, Akber Abid Gardezi, Hesiri Weerasinghe, and Anuradhi Welhenge. 2021. Security and privacy issues in medical internet of things: overview, countermeasures, challenges and future directions. Sustainability 13, 21 (2021), 11645.Google ScholarCross Ref
- T. Alam and R. Gupta. 2022. Federated Learning and Its Role in the Privacy Preservation of IoT Devices. Future Internet (2022).Google Scholar
- Amal Ghorbel, Mahmoud Ghorbel, and Mohamed Jmaiel. 2017. Privacy in cloud computing environments: a survey and research challenges. The Journal of Supercomputing 73, 6 (2017), 2763–2800.Google ScholarDigital Library
- Josep Domingo-Ferrer, Oriol Farras, Jordi Ribes-González, and David Sánchez. 2019. Privacy-preserving cloud computing on sensitive data: A survey of methods, products and challenges. Computer Communications 140 (2019), 38–60.Google ScholarDigital Library
- Edith Ramirez, Julie Brill, Maureen K Ohlhausen, Joshua D Wright, and Terrell McSweeny. 2014. Data brokers: A call for transparency and accountability. Federal Trade Commission(2014), 97–100.Google Scholar
- Pan Jun Sun. 2019. Privacy protection and data security in cloud computing: a survey, challenges, and solutions. IEEE Access 7(2019), 147420–147452.Google ScholarCross Ref
- Wanrong Z., Olga O., and Rachel Cummings. 2020. Attribute Privacy: Framework and Mechanisms. arXiv:2009.04013 (2020).Google Scholar
- Pasika Ranaweera, Anca Delia Jurcut, and Madhusanka Liyanage. 2021. Survey on multi-access edge computing security and privacy. IEEE Communications Surveys & Tutorials 23, 2 (2021), 1078–1124.Google ScholarCross Ref
- GDPR Enforcement Tracker. ([n. d.]). https://www.enforcementtracker.com/ last accessed on 30 Dec 2023.Google Scholar
- Dave Singelée, Stefaan Seys, Lejla Batina, and Ingrid Verbauwhede. 2011. The communication and computation cost of wireless security. In Proceedings of the fourth ACM conference on Wireless network security. 1–4.Google ScholarDigital Library
- Giulio Giaconi, Deniz Gunduz, and H Vincent Poor. 2018. Privacy-aware smart metering: Progress and challenges. IEEE Signal Processing Magazine 35, 6 (2018), 59–78.Google ScholarCross Ref
- Colin J Bennett. 2018. The European General Data Protection Regulation: An instrument for the globalization of privacy standards?Information Polity 23, 2 (2018), 239–246.Google Scholar
- Ann C. 2017. Global privacy and security, by design: Turning the “privacy vs. security” paradigm on its head. (2017).Google Scholar
- Arpan Bhattacharjee, Shahriar Badsha, Md Tamjid Hossain, Charalambos Konstantinou, and Xueping Liang. 2021. Vulnerability characterization and privacy quantification for cyber-physical systems. arXiv:2110.15417 (2021).Google Scholar
- Brendan McMahan, Eider Moore, Daniel Ramage, Seth Hampson, and Blaise Aguera y Arcas. 2x017. Communication-efficient learning of deep networks from decentralized data. In Artificial intelligence and statistics. PMLR.Google Scholar
- Keith Bonawitz, Hubert Eichner, Wolfgang Grieskamp, Huba, et al. 2019. Towards federated learning at scale: System design. Proceedings of Machine Learning and Systems (2019).Google Scholar
- Yujing Chen, Yue Ning, Martin Slawski, and Huzefa Rangwala. 2020. Asynchronous online federated learning for edge devices with non-iid data. In 2020 IEEE International Conference on Big Data (Big Data). IEEE, 15–24.Google ScholarCross Ref
- Chamara Sandeepa, B. Siniarski, Shen Wang, and Madhusanka Liyanage. 2023. Rec-Def: A Recommendation-based Defence Mechanism for Privacy Preservation in Federated Learning Systems. IEEE Transactions on Consumer Electronics(2023).Google Scholar
- Yehuda Lindell. 2020. Secure multiparty computation. Commun. ACM 64, 1 (2020), 86–96.Google ScholarDigital Library
- Yong Li, Yipeng Zhou, Alireza Jolfaei, Dongjin Yu, Gaochao Xu, and Xi Zheng. 2020. Privacy-preserving federated learning framework based on chained secure multiparty computing. IEEE Internet of Things Journal 8, 8 (2020), 6178–6186.Google ScholarCross Ref
- Chandra Thapa, Pathum Chamikara Mahawaga Arachchige, Seyit Camtepe, and Lichao Sun. 2022. Splitfed: When federated learning meets split learning. In Proceedings of the AAAI Conference on Artificial Intelligence.Google ScholarCross Ref
- Graham Cormode, Somesh Jha, Tejas Kulkarni, Ninghui Li, Divesh Srivastava, and Tianhao Wang. 2018. Privacy at scale: Local differential privacy in practice. In International Conference on Management of Data.Google ScholarDigital Library
- Kang W, Jun L, Ming D, Chuan M, Howard Y, Farhad F, Shi J, Tony Q, and Vincent P. 2020. Federated learning with differential privacy: Algorithms and performance analysis. IEEE Transactions on Info. Forensics and Security (2020).Google Scholar
- Hongkyu Lee, Jeehyeong Kim, Seyoung Ahn, Rasheed Hussain, Sunghyun Cho, and Junggab Son. 2021. Digestive neural networks: A novel defense strategy against inference attacks in federated learning. computers & security(2021).Google Scholar
- Ziqi Yang, Bin Shao, Bohan Xuan, Ee-Chien Chang, and Fan Zhang. 2020. Defending model inversion and membership inference attacks via prediction purification. arXiv preprint arXiv:2005.03915(2020).Google Scholar
- M Kim, O Günlü, and R Schaefer. 2021. Federated learning with local differential privacy: Trade-offs between privacy, utility, and communication. In IEEE International Conference on Acoustics, Speech and Signal Processing. IEEE.Google ScholarCross Ref
- Abbas Acar, Hidayet Aksu, A Selcuk Uluagac, and Mauro Conti. 2018. A survey on homomorphic encryption schemes: Theory and implementation. ACM Computing Surveys (CSUR) 51, 4 (2018), 1–35.Google ScholarDigital Library
- Latif U Khan, Ibrar Yaqoob, Muhammad Imran, Zhu Han, and Choong Seon Hong. 2020. 6G wireless systems: A vision, architectural elements, and future directions. IEEE access 8(2020), 147029–147044.Google Scholar
- Goiuri Peralta, Raul G Cid-Fuentes, Josu Bilbao, and Pedro M Crespo. 2019. Homomorphic encryption and network coding in iot architectures: Advantages and future challenges. Electronics 8, 8 (2019), 827.Google ScholarCross Ref
- Saurabh S, Pradip Kumar S, Seo Yeon M, and Jong Hyuk P. 2017. Advanced lightweight encryption algorithms for IoT devices: survey, challenges and solutions. Journal of Ambient Intelligence and Humanized Computing (2017).Google Scholar
- A Shahidinejad, Mostafa Ghobaei-A, Alireza S, M Shojafar, and S Kumari. 2021. Light-edge: a lightweight authentication protocol for IoT devices in an edge-cloud environment. IEEE consumer electronics magazine(2021).Google Scholar
- Arwa Alrawais, Abdulrahman Alhothaily, Chunqiang Hu, and Xiuzhen Cheng. 2017. Fog computing for the internet of things: Security and privacy issues. IEEE Internet Computing 21, 2 (2017), 34–42.Google ScholarDigital Library
- Mengmeng Yang, Tianqing Zhu, Bo Liu, Yang Xiang, and Wanlei Zhou. 2018. Machine learning differential privacy with multifunctional aggregation in a fog computing architecture. IEEE Access 6(2018), 17119–17129.Google ScholarCross Ref
- Youyang Qu, Longxiang Gao, Tom H Luan, Yong Xiang, Shui Yu, Bai Li, and Gavin Zheng. 2020. Decentralized privacy using blockchain-enabled federated learning in fog computing. IEEE Internet of Things Journal 7, 6 (2020), 5171–5183.Google ScholarCross Ref
- Mithun Mukherjee, Rakesh Matam, Lei Shu, Leandros Maglaras, Mohamed Amine Ferrag, Nikumani Choudhury, and Vikas Kumar. 2017. Security and privacy in fog computing: Challenges. IEEE Access 5(2017), 19293–19304.Google ScholarCross Ref
- Tharaka Hewa, Gürkan Gür, Anshuman Kalla, Mika Ylianttila, An Bracken, and Madhusanka Liyanage. 2020. The role of blockchain in 6G: Challenges, opportunities and research directions. 2nd 6G Wireless Summit (6G SUMMIT)(2020).Google Scholar
- Nazanin Zahed Benisi, Mehdi Aminian, and Bahman Javadi. 2020. Blockchain-based decentralized storage networks: A survey. Journal of Network and Computer Applications 162 (2020), 102656.Google ScholarCross Ref
- Yunlong Lu, Xiaohong Huang, Yueyue Dai, Sabita Maharjan, and Yan Zhang. 2019. Blockchain and federated learning for privacy-preserved data sharing in industrial IoT. IEEE Transactions on Industrial Informatics 16, 6(2019), 4177–4186.Google ScholarCross Ref
- Yuzheng Li, Chuan Chen, Nan Liu, Huawei Huang, Zibin Zheng, and Qiang Yan. 2020. A blockchain-based decentralized federated learning framework with committee consensus. IEEE Network 35, 1 (2020), 234–241.Google ScholarDigital Library
- Tao Wang, Zhigao Zheng, Mubashir Husain Rehmani, Shihong Yao, and Zheng Huo. 2018. Privacy preservation in big data from the communication perspective—A survey. IEEE Communications Surveys & Tutorials 21, 1 (2018), 753–778.Google ScholarCross Ref
- Jun Zhao, Teng Wang, Tao Bai, Kwok-Yan Lam, Zhiying Xu, Shuyu Shi, Xuebin Ren, Xinyu Yang, Yang Liu, and Han Yu. 2019. Reviewing and improving the gaussian mechanism for differential privacy. arXiv preprint arXiv:1911.12060(2019).Google Scholar
- Vasiliki Diamantopoulou, Michalis Pavlidis, and Haralambos Mouratidis. 2017. Privacy Level Agreements for Public Administration Information Systems.. In CAiSE-Forum-DC. 97–104.Google Scholar
- Vasiliki Diamantopoulou, Konstantinos Angelopoulos, Michalis Pavlidis, and Haralambos Mouratidis. 2017. A Metamodel for GDPR-based Privacy Level Agreements.. In ER Forum/Demos, Vol. 1979. 285–291.Google Scholar
- Inge G, Raphaël G, and Martin H. 2018. Towards a holistic regulatory approach for the European data economy: Why the illusive notion of non-personal data is counterproductive to data innovation. TILEC Law and Economics(2018).Google Scholar
- Ajmeera Kiran and N Shirisha. 2022. K-Anonymization approach for privacy preservation using data perturbation techniques in data mining. Materials Today: Proceedings(2022).Google ScholarCross Ref
- S Murthy, A Abu Bakar, F A Rahim, and R Ramli. 2019. A comparative study of data anonymization techniques. In 2019 IEEE 5th Intl Conference on Big Data Security on Cloud (BigDataSecurity). IEEE.Google ScholarCross Ref
- Can Eyupoglu, Muhammed Ali Aydin, Abdul Halim Zaim, and Ahmet Sertbas. 2018. An efficient big data anonymization algorithm based on chaos and perturbation techniques. Entropy 20, 5 (2018), 373.Google ScholarCross Ref
- Jinsung Yoon, Lydia N Drumright, and Mihaela Van Der Schaar. 2020. Anonymization through data synthesis using generative adversarial networks (ads-gan). IEEE journal of biomedical and health informatics 24, 8(2020), 2378–2388.Google ScholarCross Ref
- Wang Haoxiang, S Smys, et al. 2021. Big data analysis and perturbation using data mining algorithm. Journal of Soft Computing Paradigm (JSCP) 3, 01 (2021), 19–28.Google ScholarCross Ref
- Maryam Archie, Sophie Gershon, Abigail Katcoff, and Aaron Zeng. 2018. Who’s watching? de-anonymization of netflix reviews using amazon reviews. (2018).Google Scholar
- Abdul Majeed and Sungchang Lee. 2020. Anonymization techniques for privacy preserving data publishing: A comprehensive survey. IEEE Access (2020).Google Scholar
- Dingfan C, Ning Y, Yang Z, and Mario F. 2020. Gan-leaks: A taxonomy of membership inference attacks against generative models. In ACM SIGSAC conference on computer and communications security.Google Scholar
- K El E., L Mosquera, and Xi F. 2022. Validating a membership disclosure metric for synthetic health data. JAMIA open (2022).Google Scholar
- Dominic Broy. 2017. The European Commission’s Proposal for a Framework for the Free Flow of Non-Personal Data in the EU. Eur. Data Prot. L. Rev. 3 (2017), 380.Google ScholarCross Ref
- 2019. What constitutes data processing?(Nov 2019). https://ec.europa.eu/info/law/law-topic/data-protection/reform/what-constitutes-data-processing_en last accessed on 28 Oct 2023.Google Scholar
- 2021. Art.65 GDPR – Lawfulness of processing. (Oct 2021). https://gdpr-info.eu/art-6-gdpr/ last accessed on 15 Nov 2023.Google Scholar
- Hossein F, Samuel M, Markus M, Azalia M, et al. 2021. SAFELearn: Secure aggregation for private federated learning. In 2021 IEEE Security and Privacy Workshops (SPW). IEEE.Google Scholar
- Wei Yu, Fan Liang, Xiaofei He, William Grant Hatcher, Chao Lu, Jie Lin, and Xinyu Yang. 2017. A survey on the edge computing for the Internet of Things. IEEE access 6(2017), 6900–6919.Google Scholar
- Iris van Ooijen and Helena U Vrabec. 2019. Does the GDPR enhance consumers’ control over personal data? An analysis from a behavioural perspective. Journal of consumer policy 42, 1 (2019), 91–107.Google ScholarCross Ref
- Michael L Rustad and Thomas H Koenig. 2019. Towards a global data privacy standard. Fla. L. Rev. 71(2019), 365.Google Scholar
- Doug L. et al. 2001. 3D data management: Controlling data volume, velocity and variety. META group research note(2001).Google Scholar
- Rogelio Rivera, José G Robledo, Víctor M Larios, and Juan Manuel Avalos. 2017. How digital identity on blockchain can contribute in a smart city environment. In 2017 International smart cities conference (ISC2). IEEE, 1–4.Google Scholar
- Hsuan-Hao Chang, Wei-Yu Chiu, Hongjian Sun, and Chia-Ming Chen. 2018. User-centric multiobjective approach to privacy preservation and energy cost minimization in smart home. IEEE Systems Journal 13, 1 (2018), 1030–1041.Google ScholarCross Ref
- Johannes Heurix, Peter Zimmermann, Thomas Neubauer, and Stefan Fenz. 2015. A taxonomy for privacy enhancing technologies. Computers & Security 53 (2015), 1–17.Google ScholarDigital Library
- Karan Sheth, Keyur Patel, Het Shah, Sudeep Tanwar, Rajesh Gupta, and Neeraj Kumar. 2020. A taxonomy of AI techniques for 6G communication networks. Computer communications 161 (2020), 279–303.Google Scholar
- Jinhyun So, Başak Güler, and A Salman Avestimehr. 2020. Byzantine-resilient secure federated learning. IEEE Journal on Selected Areas in Communications 39, 7(2020), 2168–2181.Google ScholarCross Ref
- Yagmur Yigit, Christos Chrysoulas, Gokhan Yurdakul, Leandros Maglaras, and Berk Canberk. 2023. Digital Twin-Empowered Smart Attack Detection System for 6G Edge of Things Networks. arXiv preprint arXiv:2310.03554(2023).Google Scholar
- Ambika Pawar, Swati Ahirrao, and Prathamesh P Churi. 2018. Anonymization techniques for protecting privacy: a survey. In 2018 IEEE Punecon. IEEE, 1–6.Google Scholar
Index Terms
- A Survey on Privacy of Personal and Non-Personal Data in B5G/6G Networks
Recommendations
Gifting Interpretations of Personal Data
CHI EA '18: Extended Abstracts of the 2018 CHI Conference on Human Factors in Computing SystemsResearch on physical representations of data has often used personal data as its focus. Core aim of making personal data physical is to provoke self-reflections through a felt experience. In this paper, we present a preliminary study which employs the ...
Investigation on Privacy-Preserving Techniques For Personal Data
ICDAR '21: Proceedings of the 2021 ACM Workshop on Intelligent Cross-Data Analysis and RetrievalPrivacy protection technology has become a crucial part of almost every existing cross-data analysis application. The privacy-preserving technique allows sharing sensitive personal information and preserves the users' privacy. This new trend influences ...
Comments