Correspondence to: Sasidhar Duggineni , Compliance Manager at PPD part of Thermo Fisher Scientific, USA.
Copyright © 2023 The Author(s). Published by Scientific & Academic Publishing.
Data has changed and revolutionized the world around us. With the amount of data use and its need increasing every day, there comes an essential responsibility and a requirement of maintaining the integrity and security of the data. Data integrity and data security are critical issues in today's digital and electronic world, as organizations rely increasingly on electronic data intake, storage, and transmission. Data integrity refers to the accuracy, reliability, and consistency of data over its lifecycle, while data security usually refers to the protection of data from unauthorized access or modification or deletion or theft. This research paper aims to explore the various measures and new improvisation techniques that organizations can take to enhance and retrospect the existing controls for ensuring the integrity and security of their data in accordance with their business, applicable legal and regulatory requirements. These measures may include but not limited to data encryption, access control, data backup and recovery, audit trails, data privacy, cybersecurity, legal and regulatory compliance. This research paper will discuss the benefits and challenges for implementing these measures, as well as best practices for achieving highest level of data integrity and security. Ultimately, the goal of this research is to provide organizations with a comprehensive control option for data integrity and delve into new improvisation controls and techniques in product development to pro-actively address data element risks in a more effective manner. We will also further look at the different ways data can be managed and secured by having adequate controls for data integrity, security, and confidentiality.
References
[1] M. A. Shah, R. Swaminathan, and M. Baker, "Privacy-preserving audit and extraction of digital contents," IACR Cryptology EPrint Archive, vol. 186, 2008.
[2] D. Ferraiolo, R. Sandhu, S. Gavrila, R. Kuhn and R. Chandramouli, "Proposed NIST Standard for Role-based Access Control", ACM Trans. Information and System Security, vol. 4, no. 3, pp. 224-274, 2001.
[3] E.B. Fernandez, R.C. Summers and C. Wood, Database Security and Integrity., Feb. 1981.
[4] https://www.statista.com/statistics/329608/security-incidents-confirmed-data-loss-industry-size/#:~: text=Data%20breaches%20worldwide%202020%2D2021%2C%20by%20target%20industry%20and%20 organiyation%20size&text=Between%20November%202020%20and%20October,highest%20number%20 of%20data%20violations.
[5] E. Ferrari and B.M. Thuraisingham, "Security and Privacy for Web Databases and Services", Advances in Database TechnologyEDBT 2004 Proc. Ninth Int'l Conf. Extending Database Technology, Mar. 2004.
[6] E. Bertino, E. Ferrari and L. ParasilitiProvenza, "Signature and Access Control Policies", Proc. 2003 European Symp. Research in Computer Security (ESORICS-03), Oct. 2003.
[7] B. Thuraisingham, "Mandatory Security in Object-Oriented Database Systems", Proc. Int'l Conf. Object-Oriented Programming Systems Languages and Applications (OOPSLA), 1989.
[8] R. Agrawal, R. Srikant and Y. Xu, "Database Technologies for Electronic Commerce", Proc. Very Large Databases Conf. (VLDB), 2002.
[9] Trusted Computer System Evaluation Criteria, 1975.
[10] Deyan Chen and Hong Zhao, "Data Security and Privacy Protection Issues in Cloud Computing", 2012 IEEE International Conference on Computer and Electronics engineering.
[11] Mohamed Al Morsy, John Grundy, Ingo Müller, "An Analysis of The Cloud Computing Security Problem," in Proceedings of APSEC 2010 Cloud Workshop, Sydney, Australia, 30th Nov 2010.
[12] S. Subashini, V. Kavitha. A survey on security issues in service delivery models of cloud computing. Journal of Network and Computer Applications 34(2011)1-11.
[13] M. Lori, "Data security in the world of cloud computing," Co-published by the IEEE Computer And reliability Societies, pp. 61–64, 2009.
[14] C. Wang, K. Ren, W. Lou, and J. Li, "Toward publicly auditable secure cloud data storage services," Network, IEEE, vol. 24, no. 4, pp. 19–24, 2010.
[15] L. Wei, H. Zhu, Z. Cao, X. Dong, W. Jia, Y. Chen, and A. V. Vasilakos, "Security and privacy for storage and computation in cloud computing," Information Sciences, vol. 258, pp. 371–386, 2014.
[16] C. Wang, Q. Wang, K. Ren, and W. Lou, "Privacy-preserving public auditing for data storage security in cloud computing," in INFOCOM, 2010 Proceedings IEEE. Ieee, 2010, pp. 1–9.
[17] Etzioni. Medical records --- enhancing privacy. preserving the common good. Hastings Center Report, 23(2): 14--23, 1999.
[18] F. A. Lategan and M. S. Olivier. Enforcing privacy by withholding private information. In S. Qing and J. H. P. Eloff, editors, Information Security for Global Information Infrastructures, pages 421--430. Kluwer, 2000.
[19] J. Garret. John rawls on moral principles for individuals: With emphasis on implications for business ethics, February 2002.
[20] Cong Wang, Qian Wang, Kui Ren, Ning Cao and Wenjing Lou, "Towards Secure and Dependable Storage Services in Cloud Computing", IEEE Transactions on Services Computing, vol. 5, no. 2, pp. 220-232, May 2011.
[21] Breached Patient Records Tripled in 2018 vs 2017 as Health Data Security Challenges Worsen, Oct. 2018, [online] Available: https://www.protenus.com/press/press-release/breached-patient-records-tripled-in- 2018-vs-2017-as-health-data-security-challenges-worsen.
[22] Healthcare Data Breaches Reach Record High in April, Oct. 2019, [online] Available: https://www.modernhealthcare.com/cybersecurity/healthcare-data-breaches-reach-record-high-april.
[23] T. D. Oyetoyan, M. G. Jaatun and D. S. Cruzes, "Measuring developers’ software security skills usage and training needs" in Exploring Security in Software Architecture and Design, Hershey, PA, USA: IGI Global, vol. 1, 2019.
[24] G. Manogaran, C. Thota, D. Lopez and R. Sundarasekar, "Big data security intelligence for healthcare industry 4.0", Cybersecur. Ind., vol. 4, pp. 103-126, Apr. 2017.
[25] J. Bethencourt, A. Sahai, and B. Waters, "Ciphertext-policy attribute-based encryption," in Security and Privacy, 2007. SP’07. IEEE Symposium on. IEEE, 2007, pp. 321–334.
[26] C. Erway, A. Kupc ̧ ̈ u, C. Papamanthou, and R. Tamassia, "Dynamic provable ̈ data possession," in Proceedings of the 16th ACM conference on Computer and communications security. Acm, 2009, pp. 213–222.