skip to main content
survey
Free Access
Just Accepted

A Survey on Privacy of Personal and Non-Personal Data in B5G/6G Networks

Online AM:01 May 2024Publication History
Skip Abstract Section

Abstract

The upcoming Beyond 5G (B5G) and 6G networks are expected to provide enhanced capabilities such as ultra-high data rates, dense connectivity, and high scalability. It opens many possibilities for a new generation of services driven by Artificial Intelligence (AI) and billions of interconnected smart devices. However, with this expected massive upgrade, the privacy of people, organisations, and states is becoming a rising concern. The recent introduction of privacy laws and regulations for personal and non-personal data signals that global awareness is emerging in the current privacy landscape. Yet, many gaps need to be identified in the case of two data types. If not detected, they can lead to significant privacy leakages and attacks that will affect billions of people and organisations who utilise B5G/6G. This survey is a comprehensive study of personal and non-personal data privacy in B5G/6G to identify the current progress and future directions to ensure data privacy. We provide a detailed comparison of the two data types and a set of related privacy goals for B5G/6G. Next, we bring data privacy issues with possible solutions. This paper also provides future directions to preserve personal and non-personal data privacy in future networks.

References

  1. Anutusha Dogra, Rakesh Kumar Jha, and Shubha Jain. 2020. A survey on beyond 5G network with the advent of 6G: Architecture and emerging technologies. IEEE Access 9(2020), 67512–67547.Google ScholarGoogle ScholarCross RefCross Ref
  2. William Stallings and Mohit P Tahiliani. 2014. Cryptography and network security: principles and practice, vol. 6. (2014).Google ScholarGoogle Scholar
  3. Rossouw Von Solms and Johan Van Niekerk. 2013. From information security to cyber security. computers & security 38 (2013), 97–102.Google ScholarGoogle Scholar
  4. Pablo Benlloch-Caballero, Qi Wang, and Jose M Alcaraz Calero. 2023. Distributed dual-layer autonomous closed loops for self-protection of 5G/6G IoT networks from distributed denial of service attacks. Computer Networks 222(2023), 109526.Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Jingwen Zhang, Jiale Zhang, Junjun Chen, and Shui Yu. 2020. Gan enhanced membership inference: A passive local attack in federated learning. In ICC 2020-2020 IEEE International Conference on Communications (ICC). IEEE, 1–6.Google ScholarGoogle ScholarCross RefCross Ref
  6. Ligeng Zhu, Zhijian Liu, and Song Han. 2019. Deep leakage from gradients. Advances in neural information processing systems 32 (2019).Google ScholarGoogle Scholar
  7. Pawani Porambage, Gürkan Gür, Diana Pamela Moya Osorio, Madhusanka Liyanage, Andrei Gurtov, and Mika Ylianttila. 2021. The roadmap to 6G security and privacy. IEEE Open Journal of the Communications Society (2021).Google ScholarGoogle Scholar
  8. Yang Zhao, Wenchao Zhai, Jun Zhao, Tinghao Zhang, Sumei Sun, Dusit Niyato, and Kwok-Yan Lam. 2020. A comprehensive survey of 6g wireless communications. arXiv preprint arXiv:2101.03889(2020).Google ScholarGoogle Scholar
  9. Amin Shahraki, Mahmoud Abbasi, Md Piran, Mingzhe Chen, Shuguang Cui, et al. 2021. A comprehensive survey on 6g networks: Applications, core services, enabling technologies, and future challenges. arXiv:2101.12475 (2021).Google ScholarGoogle Scholar
  10. Chamitha D A, Anshuman K, Quoc-Viet P, K, et al. 2021. Survey on 6G Frontiers: Trends, Applications, Requirements, Technologies and Future Research. IEEE Open Journal of the Communications Society (2021).Google ScholarGoogle Scholar
  11. Tongyi Huang, Wu Yang, Jun Wu, Jin Ma, Xiaofei Zhang, and Daoyin Zhang. 2019. A survey on green 6G network: Architecture and technologies. IEEE Access 7(2019), 175758–175768.Google ScholarGoogle ScholarCross RefCross Ref
  12. Yang Lu and Xianrong Zheng. 2020. 6G: A survey on technologies, scenarios, challenges, and the related issues. Journal of Industrial Information Integration (2020), 100158.Google ScholarGoogle Scholar
  13. Chamara Sandeepa, B Siniarski, Nicolas Kourtellis, Shen Wang, and Madhusanka Liyanage. 2022. A survey on privacy for B5G/6G: New privacy challenges, and research directions. Journal of Industrial Information Integration (2022).Google ScholarGoogle Scholar
  14. Van-Linh Nguyen, Po-Ching Lin, Bo-Chao Cheng, Ren-Hung Hwang, and Ying-Dar Lin. 2021. Security and privacy for 6G: A survey on prospective technologies and challenges. IEEE Communications Surveys & Tutorials(2021).Google ScholarGoogle Scholar
  15. Minghao Wang, Tianqing Zhu, Tao Zhang, Jun Zhang, Shui Yu, and Wanlei Zhou. 2020. Security and privacy in 6G networks: New areas and new challenges. Digital Communications and Networks 6, 3 (2020), 281–291.Google ScholarGoogle ScholarCross RefCross Ref
  16. Yuanyuan Sun, Jiajia Liu, Jiadai Wang, Yurui Cao, and Nei Kato. 2020. When machine learning meets privacy in 6G: A survey. IEEE Communications Surveys & Tutorials 22, 4 (2020), 2694–2724.Google ScholarGoogle ScholarCross RefCross Ref
  17. Bomin Mao, Jiajia Liu, Yingying Wu, and Nei Kato. 2023. Security and Privacy on 6G Network Edge: A Survey. IEEE Communications Surveys & Tutorials(2023).Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Michèle Finck and Frank Pallas. 2020. They who must not be identified—distinguishing personal from non-personal data under the GDPR. International Data Privacy Law(2020).Google ScholarGoogle Scholar
  19. Matti Latva-aho. 2018. Radio access networking challenges towards 2030. Powerpoint Presentation, Oulu University, Finland, October (2018).Google ScholarGoogle Scholar
  20. Guangyi Liu, Yuhong Huang, Na Li, Jing Dong, Jing Jin, Qixing Wang, and Nan Li. 2020. Vision, requirements and network architecture of 6G mobile network beyond 2030. China Communications 17, 9 (2020), 92–104.Google ScholarGoogle ScholarCross RefCross Ref
  21. Helin Yang, Arokiaswami Alphones, Zehui Xiong, Dusit Niyato, Jun Zhao, and Kaishun Wu. 2020. Artificial-intelligence-enabled intelligent 6G networks. IEEE Network 34, 6 (2020), 272–280.Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Ozgur et al. Akgul. 2023. Deliverable D3.2 initial architectural enablers - hexa-X-II.EU. (Oct 2023). https://hexa-x-ii.eu/wp-content/uploads/2023/11/Hexa-X-II_D3.2_v1.0.pdfGoogle ScholarGoogle Scholar
  23. Solmaz Niknam, Abhishek Roy, et al. 2022. Intelligent O-RAN for beyond 5G and 6G wireless networks. In IEEE Globecom Workshops (GC Wkshps). IEEE.Google ScholarGoogle ScholarCross RefCross Ref
  24. Xueli An, Jianjun Wu, Wen Tong, Peiying Zhu, and Yan Chen. 2021. 6G Network Architecture Vision. In 2021 Joint European Conference on Networks and Communications & 6G Summit (EuCNC/6G Summit). IEEE, 592–597.Google ScholarGoogle ScholarCross RefCross Ref
  25. Yong Xiao, Guangming Shi, Yingyu Li, Walid Saad, and H Vincent Poor. 2020. Toward self-learning edge intelligence in 6G. IEEE Communications Magazine 58, 12 (2020), 34–40.Google ScholarGoogle ScholarCross RefCross Ref
  26. Madhusanka Liyanage, Quoc-Viet Pham, Kapal Dev, Sweta Bhattacharya, et al. 2022. A survey on Zero touch network and Service (ZSM) Management for 5G and beyond networks. Journal of Network and Computer Applications (2022).Google ScholarGoogle Scholar
  27. Yiming Wei, Mugen Peng, and Yaqiong Liu. 2020. Intent-based networks for 6G: Insights and challenges. Digital Communications and Networks 6, 3 (2020), 270–280.Google ScholarGoogle ScholarCross RefCross Ref
  28. 2018. Art. 4 GDPR – Definitions. (Mar 2018). https://gdpr-info.eu/art-4-gdpr/ last accessed on 12 Dec 2023.Google ScholarGoogle Scholar
  29. Elvia Arcelia Quintana Adriano. 2015. The natural person, legal entity or juridical person and juridical personality. Penn St. JL & Int’l Aff. 4 (2015), 363.Google ScholarGoogle Scholar
  30. Stylianos Mystakidis. 2022. Metaverse. Encyclopedia 2, 1 (2022), 486–497.Google ScholarGoogle ScholarCross RefCross Ref
  31. Reza Shokri, Marco Stronati, Congzheng Song, and Vitaly Shmatikov. 2017. Membership inference attacks against machine learning models. In 2017 IEEE symposium on security and privacy (SP). IEEE, 3–18.Google ScholarGoogle ScholarCross RefCross Ref
  32. Zhibo Wang, Yuting Huang, Mengkai Song, Libing Wu, Feng Xue, and Kui Ren. 2022. Poisoning-assisted property inference attack against federated learning. IEEE Transactions on Dependable and Secure Computing (2022).Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. REGULATION (EU) 2018/1807 OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL. ([n. d.]). https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=CELEX%3A32018R1807Google ScholarGoogle Scholar
  34. Jeeyun Sophia Baik. 2020. Data privacy against innovation or against discrimination?: The case of the California Consumer Privacy Act (CCPA). Telematics and Informatics 52 (2020).Google ScholarGoogle Scholar
  35. California Consumer Privacy Act (CCPA). ([n. d.]). https://oag.ca.gov/privacy/ccpa last accessed on 29 Nov 2023.Google ScholarGoogle Scholar
  36. What is not ‘personal information’?([n. d.]). https://www.alrc.gov.au/publication/for-your-information-australian-privacy-law-and-practice-alrc-report-108/6-the-privacy-act-some-important-definitions/what-is-not-personal-information/ last accessed on December 30, 2023.Google ScholarGoogle Scholar
  37. Review of Australian Privacy Law [2007] ALRCDP 72. ([n. d.]). 'http://www6.austlii.edu.au/cgi-bin/viewdoc/au/other/lawreform/ALRCDP/2007/72.html' last accessed on December 20, 2023.Google ScholarGoogle Scholar
  38. Laura Somaini. 2020. Regulating the Dynamic Concept of Non-Personal Data in the EU: From Ownership to Portability. Eur. Data Prot. L. Rev.(2020).Google ScholarGoogle Scholar
  39. Jeannette M Wing. 2019. The data life cycle. Harvard Data Science Review 1, 1 (2019), 6.Google ScholarGoogle Scholar
  40. Wan Siti Halimatul Munirah Wan Ahmad, Nurul Asyikin Mohamed Radzi, FS Samidi, et al. 2020. 5G technology: Towards dynamic spectrum sharing using cognitive radio networks. IEEE Access (2020).Google ScholarGoogle Scholar
  41. Mohamed Grissa, Attila Altay Yavuz, and Bechir Hamdaoui. 2019. Location privacy in cognitive radios with multi-server private information retrieval. IEEE Transactions on Cognitive Communications and Networking 5, 4(2019), 949–962.Google ScholarGoogle ScholarCross RefCross Ref
  42. Jianjun Wu, Rongpeng Li, Xueli An, C Peng, Zhe Liu, Jon Crowcroft, and Honggang Zhang. 2021. Toward native artificial intelligence in 6G networks: System design, architectures, and paradigms. arXiv preprint arXiv:2103.02823(2021).Google ScholarGoogle Scholar
  43. Wei Yang Bryan Lim, Luong, et al. 2020. Federated learning in mobile edge networks: A comprehensive survey. IEEE Communications Surveys & Tutorials(2020).Google ScholarGoogle Scholar
  44. Yousaf Bin Zikria, Rashid Ali, Muhammad Khalil Afzal, and Sung Won Kim. 2021. Next-generation internet of things (iot): Opportunities, challenges, and solutions. Sensors 21, 4 (2021), 1174.Google ScholarGoogle ScholarCross RefCross Ref
  45. Ajay Kakkar. 2020. A survey on secure communication techniques for 5G wireless heterogeneous networks. Information Fusion (2020).Google ScholarGoogle Scholar
  46. Adrienn Lukács. 2016. What is privacy? The history and definition of privacy. SZTE Repository of Publications(2016).Google ScholarGoogle Scholar
  47. 2019. A guide to GDPR data privacy requirements. (Feb 2019). https://gdpr.eu/data-privacy/ last accessed on 10 Nov 2023.Google ScholarGoogle Scholar
  48. Ken Barker, Mina Askari, Mishtu Banerjee, Kambiz Ghazinour, Brenan Mackas, Maryam Majedi, Sampson Pun, and Adepele Williams. 2009. A data privacy taxonomy. In British National Conference on Databases. Springer, 42–54.Google ScholarGoogle ScholarDigital LibraryDigital Library
  49. Daniel J Solove. 2005. A taxonomy of privacy. U. Pa. L. Rev. 154(2005), 477.Google ScholarGoogle ScholarCross RefCross Ref
  50. Md Atiqur Rahman, Tanzila Rahman, Robert Laganière, Noman Mohammed, and Yang Wang. 2018. Membership Inference Attack against Differentially Private Deep Learning Model.Trans. Data Priv. 11, 1 (2018), 61–79.Google ScholarGoogle Scholar
  51. Zhiyi Tian, Lei Cui, Jie Liang, and Shui Yu. 2022. A comprehensive survey on poisoning attacks and countermeasures in machine learning. Comput. Surveys 55, 8 (2022), 1–35.Google ScholarGoogle ScholarDigital LibraryDigital Library
  52. Madhusanka Liyanage, Jukka Salo, An Braeken, Tanesh Kumar, Suranga Seneviratne, and Mika Ylianttila. 2018. 5G privacy: Scenarios and solutions. In 2018 IEEE 5G World Forum (5GWF). IEEE, 197–203.Google ScholarGoogle Scholar
  53. Dinh C Nguyen, Ming Ding, Pubudu N Pathirana, Aruna Seneviratne, Jun Li, Dusit Niyato, Octavia Dobre, and H Vincent Poor. 2021. 6G Internet of Things: A comprehensive survey. IEEE Internet of Things Journal(2021).Google ScholarGoogle Scholar
  54. Francesca Meneghello, Matteo Calore, Daniel Zucchetto, Michele Polese, and Andrea Zanella. 2019. IoT: Internet of threats? A survey of practical security vulnerabilities in real IoT devices. IEEE Internet of Things Journal 6, 5 (2019), 8182–8201.Google ScholarGoogle ScholarCross RefCross Ref
  55. Miao Du, Kun Wang, Yuanfang Chen, Xiaoyan Wang, and Yanfei Sun. 2018. Big data privacy preserving in multi-access edge computing for heterogeneous Internet of Things. IEEE Communications Magazine 56, 8 (2018), 62–67.Google ScholarGoogle ScholarDigital LibraryDigital Library
  56. Kristin Aleksandrova. 2021. The Right to Erasure and its Implication on AAL Systems. In Proceedings of the Information Systems and Grid Technologies.Google ScholarGoogle Scholar
  57. J Connolly. 2021. The right to erasure: Comparative perspectives on an emerging privacy right. Alternative Law (2021).Google ScholarGoogle Scholar
  58. Tiago Sergio Cabral. 2020. Forgetful AI: AI and the Right to Erasure under the GDPR. Eur. Data Prot. L. Rev. 6 (2020), 378.Google ScholarGoogle ScholarCross RefCross Ref
  59. Viraaji Mothukuri, Reza M Parizi, Seyedamin Pouriyeh, Yan Huang, Ali Dehghantanha, and Gautam Srivastava. 2021. A survey on security and privacy of federated learning. Future Generation Computer Systems 115 (2021), 619–640.Google ScholarGoogle ScholarCross RefCross Ref
  60. Muhammad Mudassar Yamin, Mohib Ullah, Habib Ullah, and Basel Katt. 2021. Weaponized AI for cyber attacks. Journal of Information Security and Applications 57 (2021), 102722.Google ScholarGoogle ScholarCross RefCross Ref
  61. Anli Yan, Ruitao Hou, Xiaozhang Liu, Hongyang Yan, Teng Huang, and Xianmin Wang. 2022. Towards explainable model extraction attacks. International Journal of Intelligent Systems 37, 11(2022), 9936–9956.Google ScholarGoogle ScholarDigital LibraryDigital Library
  62. Jinyuan Jia, Ahmed Salem, et al. 2019. Memguard: Defending against black-box membership inference attacks via adversarial examples. In ACM SIGSAC conference on computer and communications security.Google ScholarGoogle ScholarDigital LibraryDigital Library
  63. Marcin Rojszczak. 2020. Does global scope guarantee effectiveness? Searching for a new legal standard for privacy protection in cyberspace. Information & Communications Technology Law 29, 1 (2020), 22–44.Google ScholarGoogle ScholarCross RefCross Ref
  64. Christian Peukert, Stefan Bechtold, Michail Batikas, and Tobias Kretschmer. 2020. European privacy law and global markets for data. Available at SSRN 3560392(2020).Google ScholarGoogle Scholar
  65. J. A Shamsi and M. Ali Khojaye. 2018. Understanding privacy violations in big data systems. It Professional (2018).Google ScholarGoogle Scholar
  66. Chafika Benzaid and Tarik Taleb. 2020. AI-driven zero touch network and service management in 5G and beyond: Challenges and research directions. IEEE Network 34, 2 (2020), 186–194.Google ScholarGoogle ScholarCross RefCross Ref
  67. Graham Greenleaf. 2019. Global data privacy laws 2019: 132 national laws & many bills. Privacy Laws and Business International Report (2019).Google ScholarGoogle Scholar
  68. Eric Goldman. 2020. An introduction to the california consumer privacy act. Santa Clara Univ. Legal Studies Research(2020).Google ScholarGoogle Scholar
  69. Shui Yu. 2016. Big privacy: Challenges and opportunities of privacy study in the age of big data. IEEE access (2016).Google ScholarGoogle Scholar
  70. Priyank Jain, Manasi Gyanchandani, and Nilay Khare. 2016. Big data privacy: a technological perspective and review. Journal of Big Data 3, 1 (2016), 1–25.Google ScholarGoogle ScholarCross RefCross Ref
  71. Heng Zhang, Yuanchao Shu, Peng Cheng, and Jiming Chen. 2016. Privacy and performance trade-off in cyber-physical systems. IEEE Network 30, 2 (2016), 62–66.Google ScholarGoogle ScholarDigital LibraryDigital Library
  72. Roy Dong, Lillian J Ratliff, Alvaro A Cárdenas, Henrik Ohlsson, and S Shankar Sastry. 2018. Quantifying the Utility–Privacy Tradeoff in the Internet of Things. ACM Transactions on Cyber-Physical Systems 2, 2 (2018), 1–28.Google ScholarGoogle ScholarDigital LibraryDigital Library
  73. Erin Egan. 2019. Data Portability and Privacy. (2019).Google ScholarGoogle Scholar
  74. Data Transfer Project. ([n. d.]). https://datatransferproject.dev/documentation last accessed on 15 Nov 2023.Google ScholarGoogle Scholar
  75. Sophie Kuebler-W, Robert Luzsa, J. Kranz, S. Mager, Emmanuel Syrmoudis, Susanne Mayr, and Jens Grossklags. 2021. The Right to Data Portability: conception, status quo, and future directions. Informatik Spektrum(2021).Google ScholarGoogle Scholar
  76. Cynthia Dwork, Adam Smith, Thomas Steinke, and Jonathan Ullman. 2017. Exposed! a survey of attacks on private data. Annu. Rev. Stat. Appl 4, 1 (2017), 61–84.Google ScholarGoogle ScholarCross RefCross Ref
  77. J. Wang, L. Wu, S. Zeadally, M. Khan, and D. He. 2021. Privacy-preserving data aggregation against malicious data mining attack for IoT-enabled smart grid. ACM Transactions on Sensor Networks (TOSN)(2021).Google ScholarGoogle Scholar
  78. Mohamed Elhoseny, Navod Neranjan Thilakarathne, Mohammed I Alghamdi, Rakesh Kumar Mahendran, Akber Abid Gardezi, Hesiri Weerasinghe, and Anuradhi Welhenge. 2021. Security and privacy issues in medical internet of things: overview, countermeasures, challenges and future directions. Sustainability 13, 21 (2021), 11645.Google ScholarGoogle ScholarCross RefCross Ref
  79. T. Alam and R. Gupta. 2022. Federated Learning and Its Role in the Privacy Preservation of IoT Devices. Future Internet (2022).Google ScholarGoogle Scholar
  80. Amal Ghorbel, Mahmoud Ghorbel, and Mohamed Jmaiel. 2017. Privacy in cloud computing environments: a survey and research challenges. The Journal of Supercomputing 73, 6 (2017), 2763–2800.Google ScholarGoogle ScholarDigital LibraryDigital Library
  81. Josep Domingo-Ferrer, Oriol Farras, Jordi Ribes-González, and David Sánchez. 2019. Privacy-preserving cloud computing on sensitive data: A survey of methods, products and challenges. Computer Communications 140 (2019), 38–60.Google ScholarGoogle ScholarDigital LibraryDigital Library
  82. Edith Ramirez, Julie Brill, Maureen K Ohlhausen, Joshua D Wright, and Terrell McSweeny. 2014. Data brokers: A call for transparency and accountability. Federal Trade Commission(2014), 97–100.Google ScholarGoogle Scholar
  83. Pan Jun Sun. 2019. Privacy protection and data security in cloud computing: a survey, challenges, and solutions. IEEE Access 7(2019), 147420–147452.Google ScholarGoogle ScholarCross RefCross Ref
  84. Wanrong Z., Olga O., and Rachel Cummings. 2020. Attribute Privacy: Framework and Mechanisms. arXiv:2009.04013 (2020).Google ScholarGoogle Scholar
  85. Pasika Ranaweera, Anca Delia Jurcut, and Madhusanka Liyanage. 2021. Survey on multi-access edge computing security and privacy. IEEE Communications Surveys & Tutorials 23, 2 (2021), 1078–1124.Google ScholarGoogle ScholarCross RefCross Ref
  86. GDPR Enforcement Tracker. ([n. d.]). https://www.enforcementtracker.com/ last accessed on 30 Dec 2023.Google ScholarGoogle Scholar
  87. Dave Singelée, Stefaan Seys, Lejla Batina, and Ingrid Verbauwhede. 2011. The communication and computation cost of wireless security. In Proceedings of the fourth ACM conference on Wireless network security. 1–4.Google ScholarGoogle ScholarDigital LibraryDigital Library
  88. Giulio Giaconi, Deniz Gunduz, and H Vincent Poor. 2018. Privacy-aware smart metering: Progress and challenges. IEEE Signal Processing Magazine 35, 6 (2018), 59–78.Google ScholarGoogle ScholarCross RefCross Ref
  89. Colin J Bennett. 2018. The European General Data Protection Regulation: An instrument for the globalization of privacy standards?Information Polity 23, 2 (2018), 239–246.Google ScholarGoogle Scholar
  90. Ann C. 2017. Global privacy and security, by design: Turning the “privacy vs. security” paradigm on its head. (2017).Google ScholarGoogle Scholar
  91. Arpan Bhattacharjee, Shahriar Badsha, Md Tamjid Hossain, Charalambos Konstantinou, and Xueping Liang. 2021. Vulnerability characterization and privacy quantification for cyber-physical systems. arXiv:2110.15417 (2021).Google ScholarGoogle Scholar
  92. Brendan McMahan, Eider Moore, Daniel Ramage, Seth Hampson, and Blaise Aguera y Arcas. 2x017. Communication-efficient learning of deep networks from decentralized data. In Artificial intelligence and statistics. PMLR.Google ScholarGoogle Scholar
  93. Keith Bonawitz, Hubert Eichner, Wolfgang Grieskamp, Huba, et al. 2019. Towards federated learning at scale: System design. Proceedings of Machine Learning and Systems (2019).Google ScholarGoogle Scholar
  94. Yujing Chen, Yue Ning, Martin Slawski, and Huzefa Rangwala. 2020. Asynchronous online federated learning for edge devices with non-iid data. In 2020 IEEE International Conference on Big Data (Big Data). IEEE, 15–24.Google ScholarGoogle ScholarCross RefCross Ref
  95. Chamara Sandeepa, B. Siniarski, Shen Wang, and Madhusanka Liyanage. 2023. Rec-Def: A Recommendation-based Defence Mechanism for Privacy Preservation in Federated Learning Systems. IEEE Transactions on Consumer Electronics(2023).Google ScholarGoogle Scholar
  96. Yehuda Lindell. 2020. Secure multiparty computation. Commun. ACM 64, 1 (2020), 86–96.Google ScholarGoogle ScholarDigital LibraryDigital Library
  97. Yong Li, Yipeng Zhou, Alireza Jolfaei, Dongjin Yu, Gaochao Xu, and Xi Zheng. 2020. Privacy-preserving federated learning framework based on chained secure multiparty computing. IEEE Internet of Things Journal 8, 8 (2020), 6178–6186.Google ScholarGoogle ScholarCross RefCross Ref
  98. Chandra Thapa, Pathum Chamikara Mahawaga Arachchige, Seyit Camtepe, and Lichao Sun. 2022. Splitfed: When federated learning meets split learning. In Proceedings of the AAAI Conference on Artificial Intelligence.Google ScholarGoogle ScholarCross RefCross Ref
  99. Graham Cormode, Somesh Jha, Tejas Kulkarni, Ninghui Li, Divesh Srivastava, and Tianhao Wang. 2018. Privacy at scale: Local differential privacy in practice. In International Conference on Management of Data.Google ScholarGoogle ScholarDigital LibraryDigital Library
  100. Kang W, Jun L, Ming D, Chuan M, Howard Y, Farhad F, Shi J, Tony Q, and Vincent P. 2020. Federated learning with differential privacy: Algorithms and performance analysis. IEEE Transactions on Info. Forensics and Security (2020).Google ScholarGoogle Scholar
  101. Hongkyu Lee, Jeehyeong Kim, Seyoung Ahn, Rasheed Hussain, Sunghyun Cho, and Junggab Son. 2021. Digestive neural networks: A novel defense strategy against inference attacks in federated learning. computers & security(2021).Google ScholarGoogle Scholar
  102. Ziqi Yang, Bin Shao, Bohan Xuan, Ee-Chien Chang, and Fan Zhang. 2020. Defending model inversion and membership inference attacks via prediction purification. arXiv preprint arXiv:2005.03915(2020).Google ScholarGoogle Scholar
  103. M Kim, O Günlü, and R Schaefer. 2021. Federated learning with local differential privacy: Trade-offs between privacy, utility, and communication. In IEEE International Conference on Acoustics, Speech and Signal Processing. IEEE.Google ScholarGoogle ScholarCross RefCross Ref
  104. Abbas Acar, Hidayet Aksu, A Selcuk Uluagac, and Mauro Conti. 2018. A survey on homomorphic encryption schemes: Theory and implementation. ACM Computing Surveys (CSUR) 51, 4 (2018), 1–35.Google ScholarGoogle ScholarDigital LibraryDigital Library
  105. Latif U Khan, Ibrar Yaqoob, Muhammad Imran, Zhu Han, and Choong Seon Hong. 2020. 6G wireless systems: A vision, architectural elements, and future directions. IEEE access 8(2020), 147029–147044.Google ScholarGoogle Scholar
  106. Goiuri Peralta, Raul G Cid-Fuentes, Josu Bilbao, and Pedro M Crespo. 2019. Homomorphic encryption and network coding in iot architectures: Advantages and future challenges. Electronics 8, 8 (2019), 827.Google ScholarGoogle ScholarCross RefCross Ref
  107. Saurabh S, Pradip Kumar S, Seo Yeon M, and Jong Hyuk P. 2017. Advanced lightweight encryption algorithms for IoT devices: survey, challenges and solutions. Journal of Ambient Intelligence and Humanized Computing (2017).Google ScholarGoogle Scholar
  108. A Shahidinejad, Mostafa Ghobaei-A, Alireza S, M Shojafar, and S Kumari. 2021. Light-edge: a lightweight authentication protocol for IoT devices in an edge-cloud environment. IEEE consumer electronics magazine(2021).Google ScholarGoogle Scholar
  109. Arwa Alrawais, Abdulrahman Alhothaily, Chunqiang Hu, and Xiuzhen Cheng. 2017. Fog computing for the internet of things: Security and privacy issues. IEEE Internet Computing 21, 2 (2017), 34–42.Google ScholarGoogle ScholarDigital LibraryDigital Library
  110. Mengmeng Yang, Tianqing Zhu, Bo Liu, Yang Xiang, and Wanlei Zhou. 2018. Machine learning differential privacy with multifunctional aggregation in a fog computing architecture. IEEE Access 6(2018), 17119–17129.Google ScholarGoogle ScholarCross RefCross Ref
  111. Youyang Qu, Longxiang Gao, Tom H Luan, Yong Xiang, Shui Yu, Bai Li, and Gavin Zheng. 2020. Decentralized privacy using blockchain-enabled federated learning in fog computing. IEEE Internet of Things Journal 7, 6 (2020), 5171–5183.Google ScholarGoogle ScholarCross RefCross Ref
  112. Mithun Mukherjee, Rakesh Matam, Lei Shu, Leandros Maglaras, Mohamed Amine Ferrag, Nikumani Choudhury, and Vikas Kumar. 2017. Security and privacy in fog computing: Challenges. IEEE Access 5(2017), 19293–19304.Google ScholarGoogle ScholarCross RefCross Ref
  113. Tharaka Hewa, Gürkan Gür, Anshuman Kalla, Mika Ylianttila, An Bracken, and Madhusanka Liyanage. 2020. The role of blockchain in 6G: Challenges, opportunities and research directions. 2nd 6G Wireless Summit (6G SUMMIT)(2020).Google ScholarGoogle Scholar
  114. Nazanin Zahed Benisi, Mehdi Aminian, and Bahman Javadi. 2020. Blockchain-based decentralized storage networks: A survey. Journal of Network and Computer Applications 162 (2020), 102656.Google ScholarGoogle ScholarCross RefCross Ref
  115. Yunlong Lu, Xiaohong Huang, Yueyue Dai, Sabita Maharjan, and Yan Zhang. 2019. Blockchain and federated learning for privacy-preserved data sharing in industrial IoT. IEEE Transactions on Industrial Informatics 16, 6(2019), 4177–4186.Google ScholarGoogle ScholarCross RefCross Ref
  116. Yuzheng Li, Chuan Chen, Nan Liu, Huawei Huang, Zibin Zheng, and Qiang Yan. 2020. A blockchain-based decentralized federated learning framework with committee consensus. IEEE Network 35, 1 (2020), 234–241.Google ScholarGoogle ScholarDigital LibraryDigital Library
  117. Tao Wang, Zhigao Zheng, Mubashir Husain Rehmani, Shihong Yao, and Zheng Huo. 2018. Privacy preservation in big data from the communication perspective—A survey. IEEE Communications Surveys & Tutorials 21, 1 (2018), 753–778.Google ScholarGoogle ScholarCross RefCross Ref
  118. Jun Zhao, Teng Wang, Tao Bai, Kwok-Yan Lam, Zhiying Xu, Shuyu Shi, Xuebin Ren, Xinyu Yang, Yang Liu, and Han Yu. 2019. Reviewing and improving the gaussian mechanism for differential privacy. arXiv preprint arXiv:1911.12060(2019).Google ScholarGoogle Scholar
  119. Vasiliki Diamantopoulou, Michalis Pavlidis, and Haralambos Mouratidis. 2017. Privacy Level Agreements for Public Administration Information Systems.. In CAiSE-Forum-DC. 97–104.Google ScholarGoogle Scholar
  120. Vasiliki Diamantopoulou, Konstantinos Angelopoulos, Michalis Pavlidis, and Haralambos Mouratidis. 2017. A Metamodel for GDPR-based Privacy Level Agreements.. In ER Forum/Demos, Vol.  1979. 285–291.Google ScholarGoogle Scholar
  121. Inge G, Raphaël G, and Martin H. 2018. Towards a holistic regulatory approach for the European data economy: Why the illusive notion of non-personal data is counterproductive to data innovation. TILEC Law and Economics(2018).Google ScholarGoogle Scholar
  122. Ajmeera Kiran and N Shirisha. 2022. K-Anonymization approach for privacy preservation using data perturbation techniques in data mining. Materials Today: Proceedings(2022).Google ScholarGoogle ScholarCross RefCross Ref
  123. S Murthy, A Abu Bakar, F A Rahim, and R Ramli. 2019. A comparative study of data anonymization techniques. In 2019 IEEE 5th Intl Conference on Big Data Security on Cloud (BigDataSecurity). IEEE.Google ScholarGoogle ScholarCross RefCross Ref
  124. Can Eyupoglu, Muhammed Ali Aydin, Abdul Halim Zaim, and Ahmet Sertbas. 2018. An efficient big data anonymization algorithm based on chaos and perturbation techniques. Entropy 20, 5 (2018), 373.Google ScholarGoogle ScholarCross RefCross Ref
  125. Jinsung Yoon, Lydia N Drumright, and Mihaela Van Der Schaar. 2020. Anonymization through data synthesis using generative adversarial networks (ads-gan). IEEE journal of biomedical and health informatics 24, 8(2020), 2378–2388.Google ScholarGoogle ScholarCross RefCross Ref
  126. Wang Haoxiang, S Smys, et al. 2021. Big data analysis and perturbation using data mining algorithm. Journal of Soft Computing Paradigm (JSCP) 3, 01 (2021), 19–28.Google ScholarGoogle ScholarCross RefCross Ref
  127. Maryam Archie, Sophie Gershon, Abigail Katcoff, and Aaron Zeng. 2018. Who’s watching? de-anonymization of netflix reviews using amazon reviews. (2018).Google ScholarGoogle Scholar
  128. Abdul Majeed and Sungchang Lee. 2020. Anonymization techniques for privacy preserving data publishing: A comprehensive survey. IEEE Access (2020).Google ScholarGoogle Scholar
  129. Dingfan C, Ning Y, Yang Z, and Mario F. 2020. Gan-leaks: A taxonomy of membership inference attacks against generative models. In ACM SIGSAC conference on computer and communications security.Google ScholarGoogle Scholar
  130. K El E., L Mosquera, and Xi F. 2022. Validating a membership disclosure metric for synthetic health data. JAMIA open (2022).Google ScholarGoogle Scholar
  131. Dominic Broy. 2017. The European Commission’s Proposal for a Framework for the Free Flow of Non-Personal Data in the EU. Eur. Data Prot. L. Rev. 3 (2017), 380.Google ScholarGoogle ScholarCross RefCross Ref
  132. 2019. What constitutes data processing?(Nov 2019). https://ec.europa.eu/info/law/law-topic/data-protection/reform/what-constitutes-data-processing_en last accessed on 28 Oct 2023.Google ScholarGoogle Scholar
  133. 2021. Art.65 GDPR – Lawfulness of processing. (Oct 2021). https://gdpr-info.eu/art-6-gdpr/ last accessed on 15 Nov 2023.Google ScholarGoogle Scholar
  134. Hossein F, Samuel M, Markus M, Azalia M, et al. 2021. SAFELearn: Secure aggregation for private federated learning. In 2021 IEEE Security and Privacy Workshops (SPW). IEEE.Google ScholarGoogle Scholar
  135. Wei Yu, Fan Liang, Xiaofei He, William Grant Hatcher, Chao Lu, Jie Lin, and Xinyu Yang. 2017. A survey on the edge computing for the Internet of Things. IEEE access 6(2017), 6900–6919.Google ScholarGoogle Scholar
  136. Iris van Ooijen and Helena U Vrabec. 2019. Does the GDPR enhance consumers’ control over personal data? An analysis from a behavioural perspective. Journal of consumer policy 42, 1 (2019), 91–107.Google ScholarGoogle ScholarCross RefCross Ref
  137. Michael L Rustad and Thomas H Koenig. 2019. Towards a global data privacy standard. Fla. L. Rev. 71(2019), 365.Google ScholarGoogle Scholar
  138. Doug L. et al. 2001. 3D data management: Controlling data volume, velocity and variety. META group research note(2001).Google ScholarGoogle Scholar
  139. Rogelio Rivera, José G Robledo, Víctor M Larios, and Juan Manuel Avalos. 2017. How digital identity on blockchain can contribute in a smart city environment. In 2017 International smart cities conference (ISC2). IEEE, 1–4.Google ScholarGoogle Scholar
  140. Hsuan-Hao Chang, Wei-Yu Chiu, Hongjian Sun, and Chia-Ming Chen. 2018. User-centric multiobjective approach to privacy preservation and energy cost minimization in smart home. IEEE Systems Journal 13, 1 (2018), 1030–1041.Google ScholarGoogle ScholarCross RefCross Ref
  141. Johannes Heurix, Peter Zimmermann, Thomas Neubauer, and Stefan Fenz. 2015. A taxonomy for privacy enhancing technologies. Computers & Security 53 (2015), 1–17.Google ScholarGoogle ScholarDigital LibraryDigital Library
  142. Karan Sheth, Keyur Patel, Het Shah, Sudeep Tanwar, Rajesh Gupta, and Neeraj Kumar. 2020. A taxonomy of AI techniques for 6G communication networks. Computer communications 161 (2020), 279–303.Google ScholarGoogle Scholar
  143. Jinhyun So, Başak Güler, and A Salman Avestimehr. 2020. Byzantine-resilient secure federated learning. IEEE Journal on Selected Areas in Communications 39, 7(2020), 2168–2181.Google ScholarGoogle ScholarCross RefCross Ref
  144. Yagmur Yigit, Christos Chrysoulas, Gokhan Yurdakul, Leandros Maglaras, and Berk Canberk. 2023. Digital Twin-Empowered Smart Attack Detection System for 6G Edge of Things Networks. arXiv preprint arXiv:2310.03554(2023).Google ScholarGoogle Scholar
  145. Ambika Pawar, Swati Ahirrao, and Prathamesh P Churi. 2018. Anonymization techniques for protecting privacy: a survey. In 2018 IEEE Punecon. IEEE, 1–6.Google ScholarGoogle Scholar

Index Terms

  1. A Survey on Privacy of Personal and Non-Personal Data in B5G/6G Networks

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in

        Full Access

        • Published in

          cover image ACM Computing Surveys
          ACM Computing Surveys Just Accepted
          ISSN:0360-0300
          EISSN:1557-7341
          Table of Contents

          Copyright © 2024 Copyright held by the owner/author(s).

          Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the owner/author(s).

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Online AM: 1 May 2024
          • Accepted: 7 April 2024
          • Revised: 7 January 2024
          • Received: 7 December 2022

          Check for updates

          Qualifiers

          • survey
        • Article Metrics

          • Downloads (Last 12 months)41
          • Downloads (Last 6 weeks)41

          Other Metrics

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader