Best Practices for Personal Data Protection in Scalable Enterprise Applications
Keywords:
personal data protection, scalable corporate applications, proxy encryption, homomorphic encryption, data integrity, access control, Cloud Computing, dynamic cloud environments, TVDc, SDLCAbstract
This article examines existing methods for protecting personal data in corporate applications, considering modern challenges in dynamic and distributed cloud environments. The study includes an extensive analysis of encryption techniques, such as proxy encryption, DNA encryption, dual encryption with fragmentation, and homomorphic encryption, as well as mechanisms for ensuring data integrity and access control. These mechanisms include cryptographic hash functions, digital signatures, message authentication codes (MAC), role-based and attribute-based access control, federated authentication, and multi-factor authentication. The research also reviews publicly available studies found on the Internet. Particular attention is given to the specifics of data protection in cloud infrastructures, where high intensity, data fragmentation, and the lack of physical security control necessitate architectural solutions such as Trusted Virtual Data Centre (TVDc) and Tera Architecture, along with the integration of security measures into the software development lifecycle (SDLC). The materials presented in this study are relevant to researchers, system architects, and corporate IT infrastructure practitioners seeking to synthesize theoretical and empirical approaches to achieve a high level of information security in the face of rapidly evolving threats.
References
. V. Raja et al. “Exploring challenges and solutions in cloud computing: A review of data security and privacy concerns.” Journal of Artificial Intelligence General science (JAIGS), vol. 4, pp.121-144, 2024.
. H. Mahalingam et al. “Neural attractor-based adaptive key generator with DNA-coded security and privacy framework for multimedia data in cloud environments.” Mathematics, vol. 11, pp.1–10, 2023.
. V. M. Padmapriya et al. “ECC joins first time with SC-FDMA for Mission “security”.” Multimedia Tools and Applications, vol.79, pp. 17945-17967, 2020.
. B. Sowmya et al. “Design and Implementation of Chao-Cryptic Architecture on FPGA for Secure Audio Communication.” Emerging Technologies in Data Mining and Information Security: Proceedings of IEMIS, vol.3, pp. 135-144, 2020.
. J. Shuford. “Contribution of Artificial Intelligence in Improving Accessibility for Individuals with Disabilities.” Journal of Knowledge Learning and Science Technology, vol. 2, pp. 421-433, 2023.
. E. A. Schwartz et al. “RNA targeting and cleavage by the type III-Dv CRISPR effector complex.” Nature communications, vol. 15, pp. 1-9, 2024
. C. Pindi et al. “Molecular basis of differential stability and temperature sensitivity of ZIKA versus dengue virus protein shells.” Scientific Reports, vol. 10, pp. 1-10, 2020.
. M. Ahsan and S. Senapati. “Water plays a cocatalytic role in epoxide ring opening reaction in aspartate proteases: a QM/MM study.” The Journal of Physical Chemistry B, vol.123, pp. 7955-7964, 2019.
. S. M. Dixit, M.Ahsan and S. Senapati. “Steering the lipid transfer to unravel the mechanism of cholesteryl ester transfer protein inhibition.” Biochemistry, vol. 58, pp. 3789-3801, 2019.
. M. R. Hasan, M. S. Gazi and N. Gurung. “Explainable AI in Credit Card Fraud Detection: Interpretable Models and Transparent Decision-making for Enhanced Trust and Compliance in the USA.” Journal of Computer Science and Technology Studies, vol. 6, pp.1-12, 2024.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 Serhii Onishchenko

This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.
Authors who submit papers with this journal agree to the following terms.