Detection and surveillance technologies: privacy-related requirements and protection schemes

  • Authors:
  • Vasilios Zorkadis

  • Affiliations:
  • Hellenic Data Protection Authority and Hellenic Open University, Athens, Greece

  • Venue:
  • International Journal of Electronic Security and Digital Forensics
  • Year:
  • 2007

Quantified Score

Hi-index 0.00

Visualization

Abstract

Detection, identification, authentication and surveillance technologies are increasingly deployed and at the same time further researched, aiming at countering terrorism and crime, protecting people and goods, and managing working procedures and activities. Although, such technologies may also be applied to secure personal data processing, their wide use raises serious concerns. For instance, when they are used for public security reasons, they led to the creation, collection, storage, communication, interconnection and analysis of huge amounts of personal data, even globally. In this paper, after reviewing relevant developments, mentioning key enabling technologies, discussing relevant risks and mentioning social, ethical, legal and political related aspects, we focus on technological issues, namely privacy-related requirements and protection schemes and techniques, which may respond to human rights and liberties related concerns. Basic building elements of protection measures range from more conventional, such as cryptography, access control and auditing to new ones based on information hiding and privacy-preserving data mining techniques. Also, the active involvement of oversight authorities in data protection schemes may significantly increase their effectiveness.