CHALLENGES IN DATA SECURITY: TECHNOLOGICAL AND REGULATORY CHALLENGES IN THE PROTECTION OF PERSONAL DATA IN THE DIGITAL ERA
Keywords:
Data Security, Artificial Intelligence, Encryption, Cloud ComputingAbstract
This study examines the challenges of personal data security in the digital era, focusing on encryption technology and the role of artificial intelligence (AI) in protecting personal data in an increasingly complex digital environment. Adopting a Systematic Literature Review (SLR) method, this study examines 91 articles obtained from IEEE Xplore and ScienceDirect to identify trends and challenges in personal data security, particularly in the context of cloud computing and the Internet of Things (IoT). The results show that although encryption technology and AI offer advanced solutions, major challenges remain in the implementation of global regulations such as GDPR and differences in policies and infrastructure across countries. This study also discusses potential solutions such as blockchain and the implementation of adaptive encryption to address weaknesses in personal data security.
References
Adam, Mumin, Mohammad Hammoudeh, Rana Alrawashdeh, and Basil Alsulaimy. 2024. ‘A Survey on Security, Privacy, Trust, and Architectural Challenges in IoT Systems’. IEEE Access 12:57128–49. doi:10.1109/ACCESS.2024.3382709.
Alarfaj, Fawaz Khaled, Iqra Malik, Hikmat Ullah Khan, Naif Almusallam, Muhammad Ramzan, and Muzamil Ahmed. 2022. ‘Credit Card Fraud Detection Using State-of-the-Art Machine Learning and Deep Learning Algorithms’. IEEE Access 10:39700–715. doi:10.1109/ACCESS.2022.3166891.
Alouffi, Bader, Muhammad Hasnain, Abdullah Alharbi, Wael Alosaimi, Hashem Alyami, and Muhammad Ayaz. 2021. ‘A Systematic Literature Review on Cloud Computing Security: Threats and Mitigation Strategies’. IEEE Access 9:57792–807. doi:10.1109/ACCESS.2021.3073203.
Alves, Paulo Henrique, Fernando Correia, Isabella Frajhof, Clarisse Sieckenius De Souza, and Helio Lopes. 2023. ‘Designing Intelligent Agents in Normative Systems Toward Data Regulation Representation’. IEEE Access 11:51590–605. doi:10.1109/ACCESS.2023.3276294.
Awaysheh, Feras M., Mohammad N. Aladwan, Mamoun Alazab, Sadi Alawadi, Jose C. Cabaleiro, and Tomas F. Pena. 2022. ‘Security by Design for Big Data Frameworks Over Cloud Computing’. IEEE Transactions on Engineering Management 69(6):3676–93. doi:10.1109/TEM.2020.3045661.
Azam, Naila, Lito Michala, Shuja Ansari, and Nguyen Binh Truong. 2023. ‘Data Privacy Threat Modelling for Autonomous Systems: A Survey from the GDPR’s Perspective’. IEEE Transactions on Big Data 9(2):388–414. doi:10.1109/TBDATA.2022.3227336.
Behera, Sadananda, Neelamadhab Padhy, Rasmita Panigrahi, and Sanjay Kumar Kuanar. 2025. ‘Crop Disease Prediction Using Deep Learning in a Federated Learning Environment: Ensuring Data Privacy and Agricultural Sustainability’. Procedia Computer Science 254:137–46. doi:10.1016/j.procs.2025.02.072.
Bliznak, Karol, Michal Munk, and Anna Pilkova. 2024. ‘A Systematic Review of Recent Literature on Data Governance (2017-2023)’. IEEE Access.
Cejas, Orlando Amaral, Muhammad Ilyas Azeem, Sallam Abualhaija, and Lionel C. Briand. 2023. ‘NLP-Based Automated Compliance Checking of Data Processing Agreements Against GDPR’. IEEE Transactions on Software Engineering 49(9):4282–4303. doi:10.1109/TSE.2023.3288901.
Chakraborty, Aditya, and Chris P. Tsokos. 2023. ‘An AI-Driven Predictive Model for Pancreatic Cancer Patients Using Extreme Gradient Boosting’. Journal of Statistical Theory and Applications 22(4):262–82. doi:10.1007/s44199-023-00063-7.
Cheng, Zhuo, Jiangxin Li, Jianjun Zhang, Chen Wang, Hui Wang, and Juyin Wu. 2025. ‘Application of Edge Computing Technology in Smart Grid Data Security’. Measurement: Sensors 37. doi:10.1016/j.measen.2024.101412.
Dai, Weiqi, Chunkai Dai, Kim Kwang Raymond Choo, Changze Cui, Deiqing Zou, and Hai Jin. 2020. ‘SDTE: A Secure Blockchain-Based Data Trading Ecosystem’. IEEE Transactions on Information Forensics and Security 15:725–37. doi:10.1109/TIFS.2019.2928256.
Dou, Haochen, Zhenwu Dan, Peng Xu, Wei Wang, Shuning Xu, Tianyang Chen, and Hai Jin. 2024. ‘Dynamic Searchable Symmetric Encryption With Strong Security and Robustness’. IEEE Transactions on Information Forensics and Security 19:2370–84. doi:10.1109/TIFS.2024.3350330.
Ghebreselassie, Meron Yonas, Henrik Hammen, and Eli Hustad. 2025. ‘Challenges and Considerations in Migration to Cloud Solutions: A Systematic Literature Review’. Pp. 214–21 in Procedia Computer Science. Vol. 256. Elsevier B.V.
Guaman, Danny S., Jose M. Del Alamo, and Julio C. Caiza. 2021. ‘GDPR Compliance Assessment for Cross-Border Personal Data Transfers in Android Apps’. IEEE Access 9:15961–82. doi:10.1109/ACCESS.2021.3053130.
Gupta, Palak, Anmol Varshney, Mohammad Rafeek Khan, Rafeeq Ahmed, Mohammed Shuaib, and Shadab Alam. 2022. ‘Unbalanced Credit Card Fraud Detection Data: A Machine Learning-Oriented Comparative Study of Balancing Techniques’. Pp. 2575–84 in Procedia Computer Science. Vol. 218. Elsevier B.V.
Han, Sejin, and Sooyong Park. 2022. ‘A Gap Between Blockchain and General Data Protection Regulation: A Systematic Review’. IEEE Access 10:103888–905.
Harbi, Yasmine, Zibouda Aliouat, Allaoua Refoufi, and Saad Harous. 2021. ‘Recent Security Trends in Internet of Things: A Comprehensive Survey’. IEEE Access 9:113292–314.
Hashemi, Seyedeh Khadijeh, Seyedeh Leili Mirtaheri, and Sergio Greco. 2023. ‘Fraud Detection in Banking Data by Machine Learning Techniques’. IEEE Access 11:3034–43. doi:10.1109/ACCESS.2022.3232287.
Ieropoulos, Vasilis, Eirini Anthi, Theodoros Spyridopoulos, Pete Burnap, Ioannis Mavromatis, Aftab Khan, and Pietro Carnelli. 2025. ‘Collaborative Intrusion Detection in Resource-Constrained IoT Environments: Challenges, Methods, and Future Directions a Review’. Journal of Information Security and Applications 93. doi:10.1016/j.jisa.2025.104127.
Isaac Abiodun, Oludare, Moatsum Alawida, Abiodun Esther Omolara, and Abdulatif Alabdulatif. 2022. ‘Data Provenance for Cloud Forensic Investigations, Security, Challenges, Solutions and Future Perspectives: A Survey’. Journal of King Saud University - Computer and Information Sciences 34(10):10217–45.
Khan, Shahnawaz, Abdullah Alourani, Saudi Arabia, Bharavi Mishra, Ashraf Ali, and Mustafa Kamal. 2022. ‘Developing a Credit Card Fraud Detection Model Using Machine Learning Approaches’. IJACSA) International Journal of Advanced Computer Science and Applications 13(3):2022. www.ijacsa.thesai.org.
Li, Yuanxin, and Darina Saxunová. 2020. ‘A Perspective on Categorizing Personal and Sensitive Data and the Analysis of Practical Protection Regulations’. Pp. 1110–15 in Procedia Computer Science. Vol. 170. Elsevier B.V.
Lingga, Patrick, Jaehoon Jeong, Jinhyuk Yang, and Jeonghyeon Kim. 2024. ‘SPT: Security Policy Translator for Network Security Functions in Cloud-Based Security Services’. IEEE Transactions on Dependable and Secure Computing 21(6):5156–69. doi:10.1109/TDSC.2024.3371788.
Liu, Yu. 2025. ‘The Latest Application and Security Analysis of Cryptography in Cloud Storage Data Audit’. Pp. 984–90 in Procedia Computer Science. Vol. 259. Elsevier B.V.
Marelli, Massimo. 2023. ‘The Law and Practice of International Organizations’ Interactions with Personal Data Protection Domestic Regulation: At the Crossroads between the International and Domestic Legal Orders’. Computer Law and Security Review 50. doi:10.1016/j.clsr.2023.105849.
Marwan, Mbarek, Abdelkarim Ait Temghart, Said Ouhmi, and Mohamed Lazaar. 2024. ‘Security, QoS and Energy Aware Optimization of Cloud-Edge Data Centers Using Game Theory and Homomorphic Encryption: Modeling and Formal Verification’. Results in Engineering 24. doi:10.1016/j.rineng.2024.102902.
Miller, Klaus M., Karlo Lukic, and Bernd Skiera. 2025. ‘The Impact of the General Data Protection Regulation (GDPR) on Online Tracking’. International Journal of Research in Marketing. doi:10.1016/j.ijresmar.2025.03.002.
Mishra, Kamta Nath, and Subhash Chandra Pandey. 2021. ‘Fraud Prediction in Smart Societies Using Logistic Regression and K-Fold Machine Learning Techniques’. Wireless Personal Communications 119(2):1341–67. doi:10.1007/s11277-021-08283-9.
Mitra, Arnab, and Anabik Pal. 2025. ‘On Signal Encryption at MapReduce and Collaborative Attribute-Based Access with ECAs for a Preprocessed Data Set with ML in a Privacy-Preserving Health 4.0’. E-Prime - Advances in Electrical Engineering, Electronics and Energy 12. doi:10.1016/j.prime.2025.100983.
Moenck, Keno, Niklas Wais, Martin Gomse, Thorsten Schüppstuhl, and Boris Paal. 2025. ‘Legal Implications of Vision-Language Foundation Models (VLFM) in Industrial Applications in Europe: An Inquiry into Data Protection, Copyright, and AI Regulation’. Procedia CIRP 134:999–1004. doi:10.1016/j.procir.2025.02.223.
Nayak, Debabrata. n.d. Understanding the Security, Privacy and Trust Challenges of Cloud Computing. Vol. 1.
Niu, Jie, Xuelian Li, Juntao Gao, and Yue Han. 2020. ‘Blockchain-Based Anti-Key-Leakage Key Aggregation Searchable Encryption for IoT’. IEEE Internet of Things Journal 7(2):1502–18. doi:10.1109/JIOT.2019.2956322.
Salih, Bassim M., and Omer K. Jasim Mohammad. 2024. ‘Cloud Data Leakage, Security, Privacy Issues and Challenges: Review’. Pp. 592–601 in Procedia Computer Science. Vol. 242. Elsevier B.V.
Sanober, Sumaya, Izhar Alam, Sagar Pande, Farrukh Arslan, Kantilal Pitambar Rane, Bhupesh Kumar Singh, Aditya Khamparia, and Mohammad Shabaz. 2021. ‘An Enhanced Secure Deep Learning Algorithm for Fraud Detection in Wireless Communication’. Wireless Communications and Mobile Computing 2021. doi:10.1155/2021/6079582.
Seiling, Lukas, Rita Gsenger, Filmona Mulugeta, Marte Henningsen, Lena Mischau, and Marie Schirmbeck. 2024. ‘Beware: Processing of Personal Data - Informed Consent Through Risk Communication’. IEEE Transactions on Professional Communication 67(1):4–25. doi:10.1109/TPC.2024.3361328.
Taherdoost, Hamed, Tuan Vinh Le, and Khadija Slimani. 2025. ‘Cryptographic Techniques in Artificial Intelligence Security: A Bibliometric Review’. Cryptography 9(1).
Tanouz, D., R. Raja Subramanian, D. Eswar, G. V. Parameswara Reddy, A. Ranjith Kumar, and C. H. V. N. M. Praneeth. 2021. ‘Credit Card Fraud Detection Using Machine Learning’. Pp. 967–72 in Proceedings - 5th International Conference on Intelligent Computing and Control Systems, ICICCS 2021. Institute of Electrical and Electronics Engineers Inc.
Wang, Lipeng, Zhi Guan, Zhong Chen, and Mingsheng Hu. 2023. ‘Enabling Integrity and Compliance Auditing in Blockchain-Based GDPR-Compliant Data Management’. IEEE Internet of Things Journal 10(23):20955–68. doi:10.1109/JIOT.2023.3285211.
De Winter, Derek P., Nina A. M. Houben, and Enrico Lopriore. 2024. How Bureaucracy Is Bleeding Science Dry: International Observational Research under the General Data Protection Regulation. http://data.europa.eu/eli/reg/2016/679/oj;
Yang, Fan, Mohammad Zoynul Abedin, Yanan Qiao, and Lvyang Ye. 2024. ‘Toward Trustworthy Governance of AI-Generated Content (AIGC): A Blockchain-Driven Regulatory Framework for Secure Digital Ecosystems’. IEEE Transactions on Engineering Management 71:14945–62. doi:10.1109/TEM.2024.3472292.
Ye, Xiongbiao, Yuhong Yan, Jia Li, and Bo Jiang. 2024. ‘Privacy and Personal Data Risk Governance for Generative Artificial Intelligence: A Chinese Perspective’. Telecommunications Policy 48(10). doi:10.1016/j.telpol.2024.102851.
Yu, Mingyang, Bo Jin, Lei Zheng, Wei Zhan, and Chenxi Dong. 2025. ‘Application of Data Encryption Technology in Computer Network Security’. Pp. 1187–93 in Procedia Computer Science. Vol. 261. Elsevier B.V.
Zafir, Ehsanul Islam, Afifa Akter, M. N. Islam, Shahid A. Hasib, Touhid Islam, Subrata K. Sarker, and S. M. Muyeen. 2024. ‘Enhancing Security of Internet of Robotic Things: A Review of Recent Trends, Practices, and Recommendations with Encryption and Blockchain Techniques’. Internet of Things (Netherlands) 28.
Zhang, Lei, Hu Xiong, Qiong Huang, Jiguo Li, Kim Kwang Raymond Choo, and Jiangtao Li. 2022. ‘Cryptographic Solutions for Cloud Storage: Challenges and Research Opportunities’. IEEE Transactions on Services Computing 15(1):567–87. doi:10.1109/TSC.2019.2937764.
Zhang, Yongxin, Jiacheng Yang, Hong Lei, Zijian Bao, Ning Lu, Wenbo Shi, and Bangdao Chen. 2024. ‘PACTA: An IoT Data Privacy Regulation Compliance Scheme Using TEE and Blockchain’. IEEE Internet of Things Journal 11(5):8882–93. doi:10.1109/JIOT.2023.3321308.
Downloads
Published
Issue
Section
License
Copyright (c) 2025 Clean Energy and Smart Technology

This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.









