Legal Models In Privacy-Preserving Big Data Mining
|International Journal of Engineering Trends and Technology (IJETT)||
|© 2020 by IJETT Journal|
|Year of Publication : 2020|
|Authors : Preeti Gulia, Hemlata
|DOI : 10.14445/22315381/IJETT-V68I7P213S|
MLA Style: Preeti Gulia, Hemlata "Legal Models In Privacy-Preserving Big Data Mining" International Journal of Engineering Trends and Technology 68.7(2020):83-92.
APA Style:Preeti Gulia, Hemlata. Legal Models In Privacy-Preserving Big Data Mining International Journal of Engineering Trends and Technology, 68(7),83-92.
Big data implies the datasets that could not be seen, obtained, oversaw, and prepared by conventional IT and programming/equipment instruments within an acceptable time. As organizations comprehend the upsides of big data on their investigation and improvement, publicizing, arrangements, checking, and salary advancement, they will logically need to manage its perils. Utilizing and adjusting big data raises enormous legal issues and potential liabilities. In this paper, different Data Protection lawful models are clarified. Legitimate Data Protection Acts of various nations are introduced in detail, and correlation is made dependent on different qualities. It is finished up after the correlation that the regular model, i.e., DCI3 Legal model is best in different circumstances and different datasets.
 S. Floridi, Luciano, and Mariarosaria Taddeo. 2016. “What Is Data Ethics?” Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences 374, no. 2083: 1–4. https://doi.org/10.1098/ rsta.2016.0360.
 Van Deursen, Alexander J. A. M., and Karen Mossberger. 2018. “Any Thing for Anyone? A New Digital Divide in Internet-of-Things Skills.” Policy & the Internet 54: 1–19. https://doi.org/10.1002/poi3.171
 Kitchin, Rob. 2014a. “Big Data, New Epistemologies, and Paradigm Shifts.” Big Data & Society 1, no. 1: 1–12. https://doi.org/10.1177/2053951714528481
 Kitchin, Rob, and Gavin McArdle. 2016. “What Makes Big Data, Big Data? Exploring the Ontological Characteristics of 26 Datasets.” Big Data & Society 3, no. 1: 1–10. https://doi.org/10.1177/2053951716631130
 Mazzocchi, Fulvio. 2015. “Could Big Data Be the End of Theory in Science? A Few Remarks on the Epistemology of Data-Driven Science.” Science & Society 16, no. 10: 1250–1255. https://doi.org/10.15252/embr.201541001
 Zödi, Zsolt. 2017. “Law and Legal Science in the Age of Big Data.” Intersections: East European Journal of Society and Politics 3, no. 2: 69–87. https://doi.org/10.17356/ieejsp.v3i2.324
 Metcalf, Jacob, Emily F. Keller, and danah boyd. 2016. “Perspectives on Big Data, Ethics, and Society.” Council for Big Data, Ethics, and Society (7 July): 1–23. http://bdes.datasociety.net/council-output/perspectives-on-b ig-dataethics-and-society
 Barnard-Wills, David. 2013. “Security, Privacy, and Surveillance in European Policy Documents.” International Data Privacy Law 3, no. 3: 170–180. https://doi.org/10.1093/idpl/ipt014.
 Cobb, Stephen. 2018. “Data Privacy vs. Data Protection: Reflecting on Privacy Day and GDPR.” We Live Security, 25 January. https://www.welivesecurity. com/2018/01/25/data-privacy-vs-data-protection-gdpr
 Burt, Andrew, and Dan Geer. 2017. “The End of Privacy.” New York Times, 5 October. https://www.nytimes.com/2017/10/05/opinion/privacy-right s-security-breaches.html
 GOV.UK. 1998. “Data Protection Act (DPA).” http://www.legislation.gov.uk/ ukpga/1998/29/contents.
 Zödi, Zsolt. 2017. “Law and Legal Science in the Age of Big Data.” Intersections: East European Journal of Society and Politics 3, no. 2: 69–87. https://doi.org/10.17356/ieejsp.v3i2.324.
 Data Protection Directive. 1995. “Directive 95/46/EC.” Official Journal of the European Communities 281 (23 November): 31–50.
 Zwitter, Andrej. 2014. “Big Data Ethics.” Big Data & Society 1, no. 2: 1–6. https://doi.org/10.1177/2053951714559253.
 Mittelstadt, Brent Daniel, Patrick Allo, Mariarosa Taddeo, Sandra Wachter, and Luciano Floridi. 2016. “The Ethics of Algorithms: Mapping the Debate.” Big Data & Society 3, no. 2: 1–21. https://doi. org/10.1177/2053951716679679
 Floridi, Luciano. 2016. “On Human Dignity as a Foundation for the Right to Privacy.” Philosophy & Technology, 29, no. 4: 307–312. https://doi. org/10.1007/s13347-016-0220-8
 Floridi, Luciano. 2017. “Group Privacy: A Defence and an Interpretation.” In Group Privacy: New Challenges of Data Technology. Philosophical Studies Series 126, edited by Linnet Taylor, Luciano Floridi, and Bart van der Sloot, 83–100. Cham: Springer International Publishing.
 Floridi, Luciano, and Mariarosaria Taddeo. 2016. “What Is Data Ethics?” Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences 374, no. 2083: 1–4. https://doi.org/10.1098/ rsta.2016.0360.
 Metcalf, Jacob, and Kate Crawford. 2016. “Where Are Human Subjects in Big Data Research? The Emerging Ethics Divide.” Big Data & Society 3, no. 1: 1–14. https://doi.org/10.1177/2053951716650211.
 Veale, Michael, and Reuben Binns. 2017. “Fairer Machine Learning in the Real World: Mitigating Discrimination without Collecting Sensitive Data.” Big Data & Society 4, no. 2: 1–17. https://doi.org/10.1177/2053951717743530.
 https://www.ftc.gov/site-information/website-policy/data-q uality-act
 https://www.govinfo.gov/content/pkg/PLAW-107publ67/pd f/PLAW-107publ67.pdf
 https://en.wikipedia.org/wiki/Office_of_Information_and_ Regulatory_Affairs
 Law Patent Group, http://mlawgroup.de/news/publications/detail.php?we_obje ctID=227
 Directive (EU) 2016.680 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data by competent authorities for the purposes of the prevention, investigation, detection or prosecution of criminal offences or the execution of criminal penalties, and on the free movement of such data, and repealing Council Framework Decision 2008/977/JHA.
 https://indiacode.nic.in/bitstream/123456789/1999/3/A200 0-21.pdf
 https://iclg.com/practice-areas/data-protection-laws-and-reg ulations/germany
 Information Commissioner’s Office. Anonymisation: managing data protection risk code of practice. ICO November 2012. http://ico.org.uk/for_organisations/data_protection/topic_g uides/~/media/docum ents/library/Data_Protection/Practical_application/anonymi sation-codev2.pdf
 https://www.dorda.at/en/publications/first-draft-new-austria n-data-protection-act-published
 https://iclg.com/practice-areas/data-protection-laws-and-reg ulations/switzerland
 Hemlata, Gulia, P. (2018). DCI3 Model for Privacy Preserving in Big Data. In Big Data Analytics (pp. 351-362). Springer, Singapore
 European Union Directive 95/46/EC
 Big Data and Data Protection, ICO Informations Commissioner’s Office
 Akhgar, B., et al.: Application of Big Data for National Security—A Practitioners Guide to Emerging Technologies. Elsevier, Amsterdam (2015)
 Example of Legal Case: http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=CE LEX: 31996L0009:EN:HTML
 Kemp, R., et al.: Legal rights in data (27 CLSR , pp. 139–151), or Practical Law at http:// uk.practicallaw.com/5-504-1074?q=Big+Data+Kemp
 Confidentiality of Personal Data: http://en.wikipedia.org/wiki/Confidentiality
 Confidentiality of Personal Data: https://depts.washington.edu/bioethx/topics/confiden.html
 Kemp, R.: Legal aspects of managing Big Data. White papers of IT+, Sept 2014
 Data Security Standards: http://www.bailii.org/ew/cases/EWHC/Ch/2005/3015.html
 Navetta, D.: Legal implications of big data. ISSA J. (2013)
 Data Protection Laws of the World. 2017 DLA Piper. http://www.dlapiperdataprotection.com
 O. Dahiya and K. Solanki, “Comprehensive cognizance of Regression Test Case Prioritization Techniques,” International journal of emerging trends in engineering research, Vol. 7 No. 11, pp. 638-646, 2019.
 O. Dahiya and K. Solanki, S. Dalal, A. Dhankhar, “Regression Testing: Analysis of its Techniques for Test Effectiveness,” International Journal of advanced trends in computer science and engineering, Vol. 9, No. 1, pp. 737-744, 2020.
 O. Dahiya and K. Solanki, S. Dalal, A. Dhankhar, “An Exploratory Retrospective Assessment on the Usage of Bio-Inspired Computing Algorithms for Optimization,” International journal of emerging trends in engineering research, Vol. 8 No. 2, pp. 414-434, 2020.
 O. Dahiya and K. Solanki, and A. Dhankhar, “Risk-Based Testing: Identifying, Assessing, Mitigating & Managing Risks Efficiently In Software Testing,” International Journal of advanced research in engineering and technology, Vol. 11, Issue 3, pp. 192-203, 2020.
 K. Solanki, and S. Kumari, “Comparative study of software clone detection techniques.” In 2016 Management and Innovation Technology International Conference (MITicon), pp. MIT-152, IEEE, 2016
 O. Dahiya, and K. Solanki, “A systematic literature study of regression test case prioritization approaches.” International Journal of Engineering & Technology, 7(4), pp.2184-2191, 2018.
 O. Dahiya, K. Solanki and S. dalal, “Comparative Analysis of Regression Test Case Prioritization Techniques,” International Journal of advanced trends in computer science and engineering, Vol. 8 No. 4, pp. 1521-1531, 2019.
 P. Gulia and Palak, “Nature-inspired soft computing based software testing techniques for reusable software components” Journal of Theoretical & Applied Information Technology, 95(24), 2017.
 P. Gulia, and Palak, “Hybrid swarm and GA based approach for software test case selection.” International Journal of Electrical & Computer Engineering, pp. 2088-8708, Issue-9, 2019.
 A. Dhankhar and K. Solanki, “A Comprehensive Review of Tools & Techniques for Big Data Analytics,” International journal of emerging trends in engineering research, Vol. 7 No. 11, pp. 556-562, 2019.
 R. Ratra, and P. Gulia, “Big Data Tools and Techniques: A Roadmap for Predictive Analytics.”, International Journal of Engineering and Advanced Technology (IJEAT), Vol. 9, Issue-2, pp. 4986-4992, 2019.
Legal framework, Privacy, Security, Legal Model, Big data.