In A World Of All Things Digital, Can You Protect Your Data?

The data security industry has seen phenomenal growth over the past decade. However, with 2017 being another record-breaking year for security and data breaches, and ransomware attacks across the globe, it would seem the security industry is still a work in progress. The significant rise in computing capabilities, AI, and machine learning is providing new ammunition for adversaries to break into advanced systems and military installations on a global scale. Take into account quantum computing and its potential to make every existing encryption standard useless, and the scope of this madness reaches another alarming level.

Is There A Remedy?

Unfortunately, there isn’t a silver bullet to end the malaise. The cure can start only with people realising and accepting that their personal data is being generated, captured and processed on a day to day basis with or without their consent. Every time you’re at an intersection that has a CCTV, book a cab for your commute, chat on IM, share a pic on social media, or even just have the Wi-Fi activated on your phone, you’re generating and communicating data. With the internet becoming ubiquitous, there is no going back on this reality unless you choose to become a Hobbit. Let’s face it – there will never be a blanket “opt-out” button for you to stop generating data.

AIM Daily XO

Join our editors every weekday evening as they steer you through the most significant news of the day, introduce you to fresh perspectives, and provide unexpected moments of joy
Your newsletter subscriptions are subject to AIM Privacy Policy and Terms and Conditions.

The real trouble is that a significant engineering rethink has not taken place in the way data is being stored, accessed and processed. Yes, we have developed advanced data structures with improved efficiency and frequently fine-tune the most common algorithms, but we still persist with age-old client server architecture. Since the early days of computing, these bulky machines have occupied over thousands of square feet at large corporations or universities with significantly less computing, memory, processing and networking capabilities even compared to a modern smartphone. We carried this approach forward into the 1990s, when the internet burst into the mainstream, and it is going strong even today.

Why Fix Something Which Is Not Broken?

Well, somewhere along the way in the past 10-15 years, a significant amount of PII (Personally Identifiable Information) started getting generated with the advent of portable devices (laptops with Wi-Fi capabilities and smartphones). These gave a whole new flavor to the traditional lifeless data stored in the servers. All of a sudden, the age of hyper personalisation has dawned upon us and a race has commenced between various tech giants to collect as much data as possible about an individual for “effective and targeted” campaigns. Every major corporation is busy building their own data repositories using ruthless and unethical ways. This siloed mentality limits innovation and acts as a hindrance to the greater good of humanity. Naturally, this highly granularised and personalised data set is also a prime target of the bad guys in the picture, leading to massive data breaches and subsequent media frenzy.

Download our Mobile App

This is the premise of the big debate taking place across the globe – if it’s my data that’s being recorded, what gives you the right/authority to store it at your end? This question is a natural derivative of the traditional client server architecture of data storage discussed above. It’s definitely a tricky situation that the world has come to. In the age of instant gratification, individuals also want things to be available with a click or a swipe without having to compromise on the privacy of their data. A short summarisation of the issue would be – can we have a balance between security, data privacy and convenience?

On A Concluding Note

An effective solution would be to flip the traditional model of the client-server architecture and have the data reside with the individual. Sounds interesting, but is there a way? Enter blockchain technology, the foundation of cryptocurrencies like Bitcoins, Ethereum and the like. If you are the user, then your device (read smartphone or laptop) will store the data and make it available across a trusted network backed by blockchain. The data will never leave your device or premise, you get to monitor what data gets captured by various applications/services and you can view an audit trail of access at any point. Most importantly, you choose to grant or deny access to your data.

As a result of using blockchain technology, the traditional “god-level” data access and storage by a central entity will be disrupted without affecting any major application functionality. Yet, it will leapfrog the traditional data security paradigm and provide a new dimension to data privacy. This approach will restore data privacy to the owner who is the true custodian. The monopoly over data ownership by a few organisations will also be broken and, due to the even distribution of data, the problem of data breaches will be solved once and for all.

Sign up for The Deep Learning Podcast

by Vijayalakshmi Anandan

The Deep Learning Curve is a technology-based podcast hosted by Vijayalakshmi Anandan - Video Presenter and Podcaster at Analytics India Magazine. This podcast is the narrator's journey of curiosity and discovery in the world of technology.

Runcy Oommen
He is an accomplished software engineer with ~15 years of SDLC product experience with string of projects primarily in the security domain. A technophile, computer polyglot and a data privacy advocate, he loves cloud and all things Linux. He is currently a Cloud Architect at BRIDGEi2i Analytics Solutions.

Our Upcoming Events

24th Mar, 2023 | Webinar
Women-in-Tech: Are you ready for the Techade

27-28th Apr, 2023 I Bangalore
Data Engineering Summit (DES) 2023

23 Jun, 2023 | Bangalore
MachineCon India 2023 [AI100 Awards]

21 Jul, 2023 | New York
MachineCon USA 2023 [AI100 Awards]

3 Ways to Join our Community

Telegram group

Discover special offers, top stories, upcoming events, and more.

Discord Server

Stay Connected with a larger ecosystem of data science and ML Professionals

Subscribe to our Daily newsletter

Get our daily awesome stories & videos in your inbox

Council Post: Evolution of Data Science: Skillset, Toolset, and Mindset

In my opinion, there will be considerable disorder and disarray in the near future concerning the emerging fields of data and analytics. The proliferation of platforms such as ChatGPT or Bard has generated a lot of buzz. While some users are enthusiastic about the potential benefits of generative AI and its extensive use in business and daily life, others have raised concerns regarding the accuracy, ethics, and related issues.