Data Protection & Security
Data Protection & Security
Abstract—With the evolution of digital services, data protec- provided an analysis on data security and protection issues
tion & security have become cruical areas and companies that associated with cloud computing. Our study focuses on data
offer digital services must have defined processes for these. These privacy & security aspects in IT service provider organization
companies face pressures from: (i) people who are concerned from the perspectives of digital services.
about data being held about them, (ii) risk of cyber attacks that
allows unauthorized data access, (iii) regulatory requirements Many companies now provide some kind of digital services
from governments and (iii) negative effect to companie’s own over Internet such as business services, real-time informa-
brand and reputation. Due to continuous changes in the rules & tion services, online commerce services, booking services
regulation and exponential growth in data security and protection and many others. The government institutions, such as tax
requirements, more research is needed to address the current administration, ministries & hospitals collect and store large
issues and requirements. Therefore, this paper deals with the
challenges and issues related to data protection & security
amount of data and provide access to personal information in
and aims to answer the research problem: how data integrity, some form of digital service.
confidentiality & availability could be achieved? The paper Some companies even host their internal web applications
highlights data protection and security related issues utilizing
on the Internet for ease of use and accessibility. Since web
the case study approach.
applications do not require any installation, it allows compa-
Keywords—Data Protection; Data Security; Digital Services; IT nies to operate them from anywhere using just a web browser.
Services Providing digital services over Internet helps companies to
attract customers while reducing labour costs & time, but it
also brings in data privacy and security challenges.
I. I NTRODUCTION
Companies offering digital services face data protection
Digital services refers to the delivery of information via an challenges that must be addressed. This study addresses the
electronic network, irrespective of time and distance. These following key elements of Information Security management:
services are entirely automated with very less human inter-
vention. The desired content is automatically generated from • Data Integrity: Data accuracy and consistency is es-
servers and delivered to the end user, usually over Internet. sential and data must be protected from being altered
or deleted against security breaches or software errors.
With services being offered over an electronic network,
Data integrity rules could be enforced by adopting a
the data protection and security becomes the top priority. Data
more rigorous approach to integrity constraint man-
being shared and made available to a large variety of users
agement [6]. Since most databases enforce integrity
and applications in real-time environment further complicates
constraints by specifying data types, therefore data
the problem of data protection [1]. Data protection involves
inconsistencies could be easily handled from the very
compliance with regulatory requirements while maintaining
beginning.
high levels of productivity. The privacy of the individuals
whose data are being collected and analyzed is increasingly • Data Confidentiality: Data must be protected against
at risk [2]. Therefore, companies holding customer data are unauthorized access by limiting access control and
directly responsible for protecting confidentiality of data. The applying physical information permissions [7]. Data
data is the most valuable asset for a company and it should be encryption algorithms and patterns such as PGP, AES,
shared only with people having authorised access. RSA, Triple DES, Twofish are commonly used for
securing data that converts human readable text to
Previous studies have explored data privacy & security ciphertext. PGP (Pretty Good Privacy) is mostly used
from various perspectives. Only few studies have focused for sharing information over Internet as it uses key
on data privacy & security from the perspective of digital pair of public-private keys [8]. AES is the standard
services. Bertino [3] has discussed the research directions in symmetric key encryption algorithm mostly used for
data privacy, confidentiality & IoT (Internet of Things) data closed environment systems and databases.
security while identifying key challenges. Xu, Jiang, Wang,
Yuan and Ren [4] reviewed the privacy issues related to • Data Availability: Data must be accessible without
data mining emphasizing on various approaches that could any interruption at all times. To achieve high avail-
help protect sensitive information . Chen and Zhao [5] have ability of data, replication techniques could be used
380
2017 International Conference on Computer and Applications (ICCA)
What is the data storage and backup policy? All the E. Sensitive data handling procedure
data is held within the case organization’s data center in the
encrypted form. The case organization had its own on-premise How sensitive data is handled? The data is maintained
data centre and it processes and maintains the database systems by the case organization and it is stored in their own data
for their customer. The health sector and local authorities are center. Furthermore, the data is encrypted and the data is
the main data sources that use various systems to store & backed up for recovery options. The case organization also
access the customer information and patient history while the has collaboration with Kyberturvallisuuskeskus (cyber security
case organization manages the data. The case organization centre authority) that develops and monitors the reliability and
uses various relational and non-relational database systems security of communication networks and acts as a national
for storing and managing data. The relational databases used communications security authority.
381
2017 International Conference on Computer and Applications (ICCA)
382
2017 International Conference on Computer and Applications (ICCA)
seems to include a lot of collaboration with external organiza- [9] K. Ranganathan, A. Iamnitchi, and I. Foster, “Improving data avail-
tions. ability through dynamic model-driven replication in large peer-to-
peer communities,” in Cluster Computing and the Grid, 2002. 2nd
IEEE/ACM International Symposium on, May 2002, pp. 376–376.
V. C ONCLUSION [10] H. Singhal and A. K. Kar, “Information security concerns in digital
services: Literature review and a multi-stakeholder approach,” in 2015
This paper aimed to answer the research problem: how data International Conference on Advances in Computing, Communications
integrity, confidentiality & availability could be achieved? The and Informatics (ICACCI), Aug 2015, pp. 901–906.
paper dealt with data protection and security related issues [11] Cabinet Office (A), ITIL Service Strategy. The Stationary Office UK,
utilizing the case study approach. 2011.
[12] Cabinet Office (B), ITIL Service Design. The Stationary Office UK,
We focused on 3 key elements of data protection and secu- 2011.
rity: Data Integrity, Data Confidentiality & Data Availability. [13] Cabinet Office (C), ITIL Service Transition. The Stationary Office UK,
We assessed the case organization’s data storage practices and 2011.
policies and highlighted the methods of data sources & data. [14] Cabinet Office (D), ITIL Service Operation. The Stationary Office
We analyzed the data accessing & sharing policies from the UK, 2011.
case organization’s perspective. Next we identified the encryp- [15] Cabinet Office (E), ITIL Continuous Service Improvement. The
Stationary Office UK, 2011.
tion and decryption algorithms and patterns used by the case
[16] A. F. Almutairi, G. E. Gardner, and A. McCarthy, “Practical guidance
organization. The web services usage and its implementation for the use of a pattern-matching technique in case-study research: A
were further analyzed in this case study. We also evaluated the case presentation,” Nursing & Health Sciences, vol. 16, no. 2, pp. 239–
sensitive data handling procedures, privacy impact assessment 244, 2014. [Online]. Available: [Link]
policies and privacy principles. We applied the pattern match- [17] R. Yin, Case Study Research: Design and Methods (4th edn). SAGE
ing technique against our predefined categories. We compared Publications, 2009.
our theoretical pattern (i.e. predefined categories) against the [18] Y. Wang and J. Liu, “An attribtue-based statistic model for privacy
observed pattern in the case organization. impact assessment,” in 2016 International Conference on Collaboration
Technologies and Systems (CTS), Oct 2016, pp. 619–621.
Future research ideas: The results of this study might be [19] N. Foukia, D. Billard, and E. Solana, “Pisces: A framework for privacy
used in data privacy, security & IT service organization. Future by design in iot,” in 2016 14th Annual Conference on Privacy, Security
studies could focus on exploring GDPR adoption rules and and Trust (PST), Dec 2016, pp. 706–713.
local law applicable. Additionally, there is need for the case [20] M. Tschersich and M. Niekamp, “Pros and cons of privacy by default:
Investigating the impact on users and providers of social network sites,”
studies that deal with big data and cloud security & privacy. in 2015 48th Hawaii International Conference on System Sciences, Jan
2015, pp. 1750–1756.
VI. ACKNOWLEDGMENT [21] K. Eisenhardt, “Building theories from case study research,” Academy
of Management Review, vol. 14, pp. 532–550, 1989.
We would like to thank the case organization’s represen-
tatives for valuable feedback and responses that helped us
to perform this study. The work for this paper was partly
conducted in Management Roadmap for Service Innovation
and Excellence project (S20527) funded by European Social
Fund, Pohjois-Savon ELY-keskus and industry partners.
R EFERENCES
[1] E. Bertino, “Big data - security and privacy,” in 2015 IEEE International
Congress on Big Data, June 2015, pp. 757–761.
[2] J. Soria-Comas and J. Domingo-Ferrer, “Big data privacy: Challenges to
privacy principles and models,” Data Science and Engineering, vol. 1,
no. 1, pp. 21–28, 2016.
[3] E. Bertino, “Data security and privacy: Concepts, approaches, and
research directions,” in 2016 IEEE 40th Annual Computer Software and
Applications Conference (COMPSAC), vol. 1, June 2016, pp. 400–407.
[4] Lei Xu, Chunxiao Jiang, Jian Wang, Jian Yuan and Yong Ren, “Infor-
mation security in big data: Privacy and data mining,” IEEE Access,
vol. 2, pp. 1149–1176, 2014.
[5] D. Chen and H. Zhao, “Data security and privacy protection issues
in cloud computing,” in 2012 International Conference on Computer
Science and Electronics Engineering, vol. 1, March 2012, pp. 647–651.
[6] C. Sophie, “A taxonomy of spatial data integrity constraints,”
GeoInformatica, vol. 1, no. 4, pp. 327–343, Dec 1997. [Online].
Available: [Link]
[7] M. Panjwani, M. Jäntti, and J. Sormunen, “It service management
from a perspective of small and medium sized companies,” in 2016
10th International Conference on the Quality of Information and
Communications Technology (QUATIC), Sept 2016, pp. 210–215.
[8] V. Gupta and H. Singh, “A review on data security using pgp & des,”
vol. 1, July 2014.
383