Legal Models In Privacy-Preserving Big Data Mining

  IJETT-book-cover  International Journal of Engineering Trends and Technology (IJETT)          
  
© 2020 by IJETT Journal
Volume-68 Issue-7
Year of Publication : 2020
Authors : Preeti Gulia, Hemlata
  10.14445/22315381/IJETT-V68I7P213S

MLA 

MLA Style: Preeti Gulia, Hemlata  "Legal Models In Privacy-Preserving Big Data Mining" International Journal of Engineering Trends and Technology 68.7(2020):83-92. 

APA Style: Preeti Gulia, Hemlata. Legal Models In Privacy-Preserving Big Data Mining International Journal of Engineering Trends and Technology, 68(7),83-92.

Abstract
Big data implies the datasets that could not be seen, obtained, oversaw, and prepared by conventional IT and programming/equipment instruments within an acceptable time. As organizations comprehend the upsides of big data on their investigation and improvement, publicizing, arrangements, checking, and salary advancement, they will logically need to manage its perils. Utilizing and adjusting big data raises enormous legal issues and potential liabilities. In this paper, different Data Protection lawful models are clarified. Legitimate Data Protection Acts of various nations are introduced in detail, and correlation is made dependent on different qualities. It is finished up after the correlation that the regular model, i.e., DCI3 Legal model is best in different circumstances and different datasets.

Reference

[1] S. Floridi, Luciano, and Mariarosaria Taddeo. 2016. “What Is Data Ethics?” Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences 374, no. 2083: 1–4. https://doi.org/10.1098/ rsta.2016.0360.
[2] Van Deursen, Alexander J. A. M., and Karen Mossberger. 2018. “Any Thing for Anyone? A New Digital Divide in Internet-of-Things Skills.” Policy & the Internet 54: 1–19. https://doi.org/10.1002/poi3.171
[3] Kitchin, Rob. 2014a. “Big Data, New Epistemologies, and Paradigm Shifts.” Big Data & Society 1, no. 1: 1–12. https://doi.org/10.1177/2053951714528481
[4] Kitchin, Rob, and Gavin McArdle. 2016. “What Makes Big Data, Big Data? Exploring the Ontological Characteristics of 26 Datasets.” Big Data & Society 3, no. 1: 1–10. https://doi.org/10.1177/2053951716631130
[5] Mazzocchi, Fulvio. 2015. “Could Big Data Be the End of Theory in Science? A Few Remarks on the Epistemology of Data-Driven Science.” Science & Society 16, no. 10: 1250–1255. https://doi.org/10.15252/embr.201541001
[6] Zödi, Zsolt. 2017. “Law and Legal Science in the Age of Big Data.” Intersections: East European Journal of Society and Politics 3, no. 2: 69–87. https://doi.org/10.17356/ieejsp.v3i2.324
[7] Metcalf, Jacob, Emily F. Keller, and danah boyd. 2016. “Perspectives on Big Data, Ethics, and Society.” Council for Big Data, Ethics, and Society (7 July): 1–23. http://bdes.datasociety.net/council-output/perspectives-on-b ig-dataethics-and-society
[8] Barnard-Wills, David. 2013. “Security, Privacy, and Surveillance in European Policy Documents.” International Data Privacy Law 3, no. 3: 170–180. https://doi.org/10.1093/idpl/ipt014.
[9] Cobb, Stephen. 2018. “Data Privacy vs. Data Protection: Reflecting on Privacy Day and GDPR.” We Live Security, 25 January. https://www.welivesecurity. com/2018/01/25/data-privacy-vs-data-protection-gdpr
[10] Burt, Andrew, and Dan Geer. 2017. “The End of Privacy.” New York Times, 5 October. https://www.nytimes.com/2017/10/05/opinion/privacy-right s-security-breaches.html
[11] GOV.UK. 1998. “Data Protection Act (DPA).” http://www.legislation.gov.uk/ ukpga/1998/29/contents.
[12] Zödi, Zsolt. 2017. “Law and Legal Science in the Age of Big Data.” Intersections: East European Journal of Society and Politics 3, no. 2: 69–87. https://doi.org/10.17356/ieejsp.v3i2.324.
[13] Data Protection Directive. 1995. “Directive 95/46/EC.” Official Journal of the European Communities 281 (23 November): 31–50.
[14] Zwitter, Andrej. 2014. “Big Data Ethics.” Big Data & Society 1, no. 2: 1–6. https://doi.org/10.1177/2053951714559253.
[15] Mittelstadt, Brent Daniel, Patrick Allo, Mariarosa Taddeo, Sandra Wachter, and Luciano Floridi. 2016. “The Ethics of Algorithms: Mapping the Debate.” Big Data & Society 3, no. 2: 1–21. https://doi. org/10.1177/2053951716679679
[16] Floridi, Luciano. 2016. “On Human Dignity as a Foundation for the Right to Privacy.” Philosophy & Technology, 29, no. 4: 307–312. https://doi. org/10.1007/s13347-016-0220-8
[17] Floridi, Luciano. 2017. “Group Privacy: A Defence and an Interpretation.” In Group Privacy: New Challenges of Data Technology. Philosophical Studies Series 126, edited by Linnet Taylor, Luciano Floridi, and Bart van der Sloot, 83–100. Cham: Springer International Publishing.
[18] Floridi, Luciano, and Mariarosaria Taddeo. 2016. “What Is Data Ethics?” Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences 374, no. 2083: 1–4. https://doi.org/10.1098/ rsta.2016.0360.
[19] Metcalf, Jacob, and Kate Crawford. 2016. “Where Are Human Subjects in Big Data Research? The Emerging Ethics Divide.” Big Data & Society 3, no. 1: 1–14. https://doi.org/10.1177/2053951716650211.
[20] Veale, Michael, and Reuben Binns. 2017. “Fairer Machine Learning in the Real World: Mitigating Discrimination without Collecting Sensitive Data.” Big Data & Society 4, no. 2: 1–17. https://doi.org/10.1177/2053951717743530.
[21] https://www.ftc.gov/site-information/website-policy/data-q uality-act
[22] https://www.govinfo.gov/content/pkg/PLAW-107publ67/pd f/PLAW-107publ67.pdf
[23] https://www.cippguide.org/tag/paperwork-reduction-act/
[24] https://en.wikipedia.org/wiki/Office_of_Information_and_ Regulatory_Affairs
[25] https://www.cippguide.org/tag/omb/
[26] Law Patent Group, http://mlawgroup.de/news/publications/detail.php?we_obje ctID=227
[27] Directive (EU) 2016.680 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data by competent authorities for the purposes of the prevention, investigation, detection or prosecution of criminal offences or the execution of criminal penalties, and on the free movement of such data, and repealing Council Framework Decision 2008/977/JHA.
[28] https://indiacode.nic.in/bitstream/123456789/1999/3/A200 0-21.pdf
[29] https://iclg.com/practice-areas/data-protection-laws-and-reg ulations/germany
[30] https://en.wikipedia.org/wiki/States_of_Germany
[31] Information Commissioner’s Office. Anonymisation: managing data protection risk code of practice. ICO November 2012. http://ico.org.uk/for_organisations/data_protection/topic_g uides/~/media/docum ents/library/Data_Protection/Practical_application/anonymi sation-codev2.pdf
[32] https://www.dorda.at/en/publications/first-draft-new-austria n-data-protection-act-published
[33] https://iclg.com/practice-areas/data-protection-laws-and-reg ulations/switzerland
[34] Hemlata, Gulia, P. (2018). DCI3 Model for Privacy Preserving in Big Data. In Big Data Analytics (pp. 351-362). Springer, Singapore
[35] European Union Directive 95/46/EC
[36] Big Data and Data Protection, ICO Informations Commissioner’s Office
[37] Akhgar, B., et al.: Application of Big Data for National Security—A Practitioners Guide to Emerging Technologies. Elsevier, Amsterdam (2015)
[38] Example of Legal Case: http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=CE LEX: 31996L0009:EN:HTML
[39] Kemp, R., et al.: Legal rights in data (27 CLSR [2], pp. 139–151), or Practical Law at http:// uk.practicallaw.com/5-504-1074?q=Big+Data+Kemp
[40] Confidentiality of Personal Data: http://en.wikipedia.org/wiki/Confidentiality
[41] Confidentiality of Personal Data: https://depts.washington.edu/bioethx/topics/confiden.html
[42] Kemp, R.: Legal aspects of managing Big Data. White papers of IT+, Sept 2014
[43] Data Security Standards: http://www.bailii.org/ew/cases/EWHC/Ch/2005/3015.html
[44] Navetta, D.: Legal implications of big data. ISSA J. (2013)
[45] Data Protection Laws of the World. 2017 DLA Piper. http://www.dlapiperdataprotection.com
[46] O. Dahiya and K. Solanki, “Comprehensive cognizance of Regression Test Case Prioritization Techniques,” International journal of emerging trends in engineering research, Vol. 7 No. 11, pp. 638-646, 2019.
[47] O. Dahiya and K. Solanki, S. Dalal, A. Dhankhar, “Regression Testing: Analysis of its Techniques for Test Effectiveness,” International Journal of advanced trends in computer science and engineering, Vol. 9, No. 1, pp. 737-744, 2020.
[48] O. Dahiya and K. Solanki, S. Dalal, A. Dhankhar, “An Exploratory Retrospective Assessment on the Usage of Bio-Inspired Computing Algorithms for Optimization,” International journal of emerging trends in engineering research, Vol. 8 No. 2, pp. 414-434, 2020.
[49] O. Dahiya and K. Solanki, and A. Dhankhar, “Risk-Based Testing: Identifying, Assessing, Mitigating & Managing Risks Efficiently In Software Testing,” International Journal of advanced research in engineering and technology, Vol. 11, Issue 3, pp. 192-203, 2020.
[50] K. Solanki, and S. Kumari, “Comparative study of software clone detection techniques.” In 2016 Management and Innovation Technology International Conference (MITicon), pp. MIT-152, IEEE, 2016
[51] O. Dahiya, and K. Solanki, “A systematic literature study of regression test case prioritization approaches.” International Journal of Engineering & Technology, 7(4), pp.2184-2191, 2018.
[52] O. Dahiya, K. Solanki and S. dalal, “Comparative Analysis of Regression Test Case Prioritization Techniques,” International Journal of advanced trends in computer science and engineering, Vol. 8 No. 4, pp. 1521-1531, 2019.
[53] P. Gulia and Palak, “Nature-inspired soft computing based software testing techniques for reusable software components” Journal of Theoretical & Applied Information Technology, 95(24), 2017.
[54] P. Gulia, and Palak, “Hybrid swarm and GA based approach for software test case selection.” International Journal of Electrical & Computer Engineering, pp. 2088-8708, Issue-9, 2019.
[55] A. Dhankhar and K. Solanki, “A Comprehensive Review of Tools & Techniques for Big Data Analytics,” International journal of emerging trends in engineering research, Vol. 7 No. 11, pp. 556-562, 2019.
[56] R. Ratra, and P. Gulia, “Big Data Tools and Techniques: A Roadmap for Predictive Analytics.”, International Journal of Engineering and Advanced Technology (IJEAT), Vol. 9, Issue-2, pp. 4986-4992, 2019.

Keywords
Legal framework, Privacy, Security, Legal Model, Big data.