The Privacy-Centric Data Pipeline : Strategies for Implementing Robust Security Measures in Data Engineering

Authors

  • Pradeep Kumar Sekar Texas A&M University, USA Author

DOI:

https://doi.org/10.32628/CSEIT241051046

Keywords:

Data Privacy, Cybersecurity, Data Engineering, Regulatory Compliance, Data Governance

Abstract

This article presents a comprehensive framework for addressing data privacy and security challenges in modern data engineering environments. As organizations grapple with ever-increasing volumes of sensitive data and an evolving regulatory landscape, data engineers face complex challenges in safeguarding information throughout its lifecycle. We explore key components of a robust data protection strategy, including regulatory compliance, technical safeguards, and organizational practices. Our analysis covers critical areas such as encryption methodologies, access control mechanisms, data masking techniques, and lifecycle management policies. We also examine the role of data governance frameworks and the importance of continuous employee training in maintaining a secure data ecosystem. By synthesizing current best practices and emerging trends, this article provides data engineers and organizations with actionable insights for implementing effective privacy and security measures. Our findings underscore the need for a holistic approach that integrates technical solutions with strong governance practices to ensure data integrity, confidentiality, and compliance in an increasingly data-driven world.

Downloads

Download data is not yet available.

References

D. Morato, E. Berrueta, E. Magaña and M. Izal, "Ransomware early detection by the analysis of file sharing traffic," Journal of Network and Computer Applications, vol. 124, pp. 14-32, 2018. [Online]. Available: https://doi.org/10.1016/j.jnca.2018.09.013 DOI: https://doi.org/10.1016/j.jnca.2018.09.013

S. Yu and S. Guo, "Big Data Concepts, Theories, and Applications," Springer International Publishing, 2016. [Online]. Available: https://doi.org/10.1007/978-3-319-27763-9 DOI: https://doi.org/10.1007/978-3-319-27763-9

P. Voigt and A. von dem Bussche, "The EU General Data Protection Regulation (GDPR): A Practical Guide," Springer International Publishing, 2017. [Online]. Available: https://doi.org/10.1007/978-3-319-57959-7 DOI: https://doi.org/10.1007/978-3-319-57959-7

California State Legislature, "California Consumer Privacy Act of 2018," California Civil Code, Title 1.81.5, Sections 1798.100-1798.199.100, 2018. [Online]. Available: https://leginfo.legislature.ca.gov/faces/codes_displayText.xhtml?division=3.&part=4.&lawCode=CIV&title=1.81.5

E. Barker, "Recommendation for Key Management: Part 1 – General," National Institute of Standards and Technology (NIST) Special Publication 800-57 Part 1 Revision 5, May 2020. [Online]. Available: https://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-57pt1r5.pdf

C. Dwork and A. Roth, "The Algorithmic Foundations of Differential Privacy," Foundations and Trends in Theoretical Computer Science, vol. 9, no. 3-4, pp. 211-407, 2014. [Online]. Available: https://doi.org/10.1561/0400000042 DOI: https://doi.org/10.1561/0400000042

L. Rosenfeld, P. Moravec, and J. Lambert, "Information Architecture: For the Web and Beyond," 4th Edition, O'Reilly Media, 2015. [Online]. Available: https://www.oreilly.com/library/view/information-architecture-4th/9781491913529/

National Institute of Standards and Technology, "Guide to Computer Security Log Management," NIST Special Publication 800-92, September 2006. [Online]. Available: https://nvlpubs.nist.gov/nistpubs/Legacy/SP/nistspecialpublication800-92.pdf

R. Abraham, J. Schneider, and J. vom Brocke, "Data governance: A conceptual framework, structured review, and research agenda," International Journal of Information Management, vol. 49, pp. 424-438, 2019. [Online]. Available: https://doi.org/10.1016/j.ijinfomgt.2019.07.008 DOI: https://doi.org/10.1016/j.ijinfomgt.2019.07.008

SANS Institute, "Security Awareness Report 2021: Managing Human Cyber Risk," 2021. [Online]. Available: https://www.sans.org/security-awareness-training/resources/reports/sareport-2021/

Downloads

Published

01-11-2024

Issue

Section

Research Articles

How to Cite

[1]
Pradeep Kumar Sekar, “The Privacy-Centric Data Pipeline : Strategies for Implementing Robust Security Measures in Data Engineering”, Int. J. Sci. Res. Comput. Sci. Eng. Inf. Technol, vol. 10, no. 5, pp. 571–579, Nov. 2024, doi: 10.32628/CSEIT241051046.

Similar Articles

1-10 of 362

You may also start an advanced similarity search for this article.