Reconciliation of privacy with preventive cybersecurity: the bright internet approach

Jae Kyu Lee, Younghoon Chang, Hun Yeong Kwon, Beopyeon Kim

Research output: Journal PublicationArticlepeer-review

29 Citations (Scopus)

Abstract

The emergence of a preventive cybersecurity paradigm that aims to eliminate the sources of cybercrime threats is becoming an increasingly necessary complement to the current self-defensive cybersecurity systems. One concern associated with adopting such preventive measures is the risk of privacy infringement. Therefore, it is necessary to design the future Internet infrastructure so that it can appropriately balance preventive cybersecurity measures with privacy protections. This research proposes to design the Internet infrastructure using the preventive cybersecurity measures of the Bright Internet, namely preventive cybersecurity protocol and identifiable anonymity protocol, and ten privacy rights derived from Europe’s General Data Protection Regulations (GDPR). We then analyze the legitimacy of the five steps of the preventive cybersecurity protocol and the four features of the identifiable anonymity protocol from the perspectives of ten privacy rights. We address the legitimacy from the perspective of potential victims’ self-defense rights. Finally, we discuss four potential risks that may occur to the innocent senders and proposed resilient recovery procedures.

Original languageEnglish
Pages (from-to)45-57
Number of pages13
JournalInformation Systems Frontiers
Volume22
Issue number1
DOIs
Publication statusPublished - 1 Feb 2020
Externally publishedYes

Keywords

  • Bright internet
  • GDPR
  • Identifiable anonymity protocol
  • Preventive cybersecurity protocol
  • Privacy rights
  • Self-defense rights

ASJC Scopus subject areas

  • Theoretical Computer Science
  • Software
  • Information Systems
  • Computer Networks and Communications

Fingerprint

Dive into the research topics of 'Reconciliation of privacy with preventive cybersecurity: the bright internet approach'. Together they form a unique fingerprint.

Cite this