Affiliation:
1. University of Modern Sciences, Yemen
2. College of Computers and Information Technology, Taif University, Saudi Arabia
3. University of Gezira, Malaysia
Abstract
Data security and privacy have emerged as businesses struggle with the growing digitization of operations and the abundance of data in the age of artificial intelligence and digital twins. An overview of the issues and solutions relating to data security and privacy in the context of AI and digital twins is given in this chapter. The chapter emphasizes the value of data classification and recognizing how sensitive the data being created and used is. The necessity of strong security measures, such as access controls, authentication procedures, and encryption methods, is emphasized in order to safeguard data against unwanted access and breaches. To further assure data security and compliance, the chapter underlines the significance of ongoing monitoring, auditing, and risk assessment procedures. It examines how to successfully detect and mitigate security problems by utilizing real-time monitoring, routine audits, and proactive risk assessments.
Reference72 articles.
1. Big healthcare data: preserving security and privacy
2. Data governance: A conceptual framework, structured review, and research agenda. International Journal of Information Management, 49, 424-438.;R.Abraham,2019
3. Aivazpour, Z., Valecha, R., & Chakraborty, R. (2022). Data breaches: An empirical study of the effect of monitoring services.The Data Base for Advances in Information Systems, 53(4), 65–82.
4. C2PS: A Digital Twin Architecture Reference Model for the Cloud-Based Cyber-Physical Systems
5. Compliance with Malaysian Personal Data Protection Act 2010 by banking and financial institutions, a legal survey on privacy policies
Cited by
7 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Deterministic Networking (DetNet): Architecture, Protocols, and Advanced Applications;2024 9th International Conference on Mechatronics Engineering (ICOM);2024-08-13
2. Algorithm for Resource Allocation and Computing Offloading in 6G Networks: Deep Reinforcement Learning-based;2024 9th International Conference on Mechatronics Engineering (ICOM);2024-08-13
3. A review of digital twins and their application in cybersecurity based on artificial intelligence;Artificial Intelligence Review;2024-07-10
4. Building Trust and Credibility;Advances in Hospitality, Tourism, and the Services Industry;2024-05-31
5. Multi-Access Edge Computing Using Intelligent Mobile User Resource Allocation In 6G;2024 IEEE 4th International Maghreb Meeting of the Conference on Sciences and Techniques of Automatic Control and Computer Engineering (MI-STA);2024-05-19