Title: The role of Signal Processing in Meeting Cyber-Security and Privacy Challenges
Abstract: We are in an era where computing and communication technologies are an integral part of our lives. Our environment is becoming increasingly more cyberphysical, with sensors and actuators exchanging information through a variety of networks. We access information from the cloud, share information with each other on social networks, and synthesize new information all while we are on-the-go. Storage technologies have also evolved significantly, with data density and access speeds projected to continue to increase dramatically over the next decade. The confluence of these technologies is leading to huge volumes of data flowing across our networks, to and from computers where they will be analyzed, and deposited into vast databases for later retrieval. The huge quantities of data poses new societal risks that are just now starting to manifest. Users post information on social networks unaware of the privacy risks they face; companies submit information to the cloud for processing to reduce their own computing costs yet unaware that potentially sensitive information might be leaked; sensor networks and global positioning systems monitor the state of our roads and vehicles yet reveal where we are driving to/from and even why. Although some of these systems might be protected using conventional cryptographic protocols, many of them cannot and many of the risks exist outside the realm of protection offered by a cipher suite. For example, once information has been decrypted and placed into a database in plaintext it loses the confidentiality provided by the secure socket that connected the originating client to the database. Now, not only does the owner of that database know the exact value of that data, but it can examine the entirety of data it holds in order to glean information beyond the scope of the information provided. To protect data from unforeseen security and privacy breaches, we should revisit information security and privacy from a fundamental point of view and search for techniques that complement traditional cryptographic services. Although conventional cryptographic protocols and services can and must be a part of the solution to ensuring data security and privacy, such techniques do not reflect the full spectrum of techniques available to protecting information. In particular, information is associated with a particular
Publication Year: 2013
Publication Date: 2013-01-01
Language: en
Type: article
Access and Citation
AI Researcher Chatbot
Get quick answers to your questions about the article from our AI researcher chatbot