sitting on the offline system. In addition, the valid
data transmissions across the two systems are short
bursts of few characters. The restriction helps prevent
theft of sensitive PII by both internal and external
parties.
It must be noted that for this solution to be
effective, it must be used in-conjunction with other
techniques such as the pseudonymizing of offline data
before corresponding records are created online as
outlined in Fig5. In addition, online data must be
anonymous so that if the records are leaked, no
identifying information would be part of the leaked
records. Furthermore, random IDs must be used for
the online system to ensure privacy of users is
maintained.
In Our next paper will detail the algorithms to be
used for the pseudonymization of PII as well as the
generation of Random electronic IDs for anonymous
use of electronic services such as ecommerce.
7 CONCLUSION
The experiment results show that it is possible to
protect PII from hackers by not presenting any
possibility of accessing the data regardless of the
security configurations of the systems holding that
data. The fact that no online user can reach the offline
system holding sensitive data makes the system more
secure. Enhanced protection comes in because no one
would be able to access the offline system from the
online system as the separation is physical. In
addition, even if someone breached the security of the
online system, they would need physical access to the
offline side of the data protector to configure it to
accept and allow transfer of data towards the offline
system. The Restricted amount of data that can be
sent via the data protector is a huge deterrent to
would-be data criminals as the time it would take
would render the exercise futile.
To make the proposed solution effective, it must
be implemented as recommended in Fig5 as well as
the detailed process flows in Fig6 and Fig8. The
implementation of the proposed solution in the
manner outlined would create a layered defence
mechanism to protect PII as well provide privacy to
the user. It would further, make it possible for
authorities to trace users who would commit fraud
online if need arises. The approach is good to the
good elements and bad to the bad elements.
REFERENCES
Aarthy, D. K., Aarthi, M., Farhath, K. A., Lakshana, S., &
Lavanya, V. (2017). Reputation-based trust
management in cloud using a trusted third party.
ICONSTEM 2017 - Proceedings: 3rd IEEE
International Conference on Science Technology,
Engineering and Management, 2018-Janua, 220–225.
https://doi.org/10.1109/ICONSTEM.2017.8261418
Ali, S. S., Chakraborty, R. S., Mukhopadhyay, D., &
Bhunia, S. (2011). Multi-level attacks: An emerging
security concern for cryptographic hardware.
Proceedings -Design, Automation and Test in Europe,
DATE, 1176–1179. https://doi.org/10.1109/date.2011.
5763307
Bao, Z., Wang, Q., Shi, W., Wang, L., Lei, H., & Chen, B.
(2020). When Blockchain Meets SGX: An Overview,
Challenges, and Open Issues. IEEE Access, 8, 170404–
170420. https://doi.org/10.1109/access.2020.3024254
Coppolino, L., D’Antonio, S., Mazzeo, G., & Romano, L.
(2019). A comprehensive survey of hardware-assisted
security: From the edge to the cloud. Internet of Things,
6, 100055. https://doi.org/10.1016/j.iot.2019.100055
Frank A Cona, M. D. P. (2019). Patent No. US 2019 /
0333054 A1. United States of America.
Hauer, B. (2015). Data and information leakage prevention
within the scope of information security. IEEE Access,
3, 2554–2565. https://doi.org/10.1109/ACCESS.2015.
2506185
II-Agure, Z., Belsam, A., & Yun-ke, C. (2019). The
Semantics of Anomalies in IoT Integrated BlockChain
Network. IEEE, 144–146.
Innab, N., & Alamri, A. (2018). The Impact of DDoS on E-
commerce. 21st Saudi Computer Society National
Computer Conference, NCC 2018, 1–4. https://doi.org/
10.1109/NCG.2018.8593125
Jamshiya, P. K., & Menon, D. M. (2018). Design of a
Trusted Third Party Key Exchange Protocol for Secure
Internet of Things (IoT). Proceedings of the
International Conference on Inventive Communication
and Computational Technologies, ICICCT 2018,
(Icicct), 1834–1838. https://doi.org/10.1109/ICICCT.
2018.8473281
Kangwa, M., Lubobya, C. S., & Phiri, J. (2021). Prevention
of Personally Identifiable Information Leakage in E-
commerce via Offline Data Minimisation and
Pseudonymisation. International Journal of Innovative
Science and Research Technology, 6(1), 209–212.
Retrieved from https://scholar.google.com/scholar?
hl=en&as_sdt=0%2C5&q=mukuka+kangwa&oq=
Locher, T., Obermeier, S., & Pignolet, Y. A. (2018). When
Can a Distributed Ledger Replace a Trusted Third
Party? 2018 IEEE International Conference on Internet
of Things (IThings) and IEEE Green Computing and
Communications (GreenCom) and IEEE Cyber,
Physical and Social Computing (CPSCom) and IEEE
Smart Data (SmartData), 1069–1077. https://doi.org/
10.1109/Cybermatics_2018.2018.00197
Pawar, H. R., & Harkut, D. G. (2018). Classical and
Quantum Cryptography for Image Encryption