
New Approaches to Data Identification and Protection
Abstract
The article examines the issue of ensuring information security and privacy. New techniques for data protection are proposed through encryption, maintaining anonymity, and other protective measures. It is shown that updating encryption algorithms and enhancing data anonymity can significantly improve the effectiveness of data protection. A roadmap for scientific and technological communities to develop new strategies for data protection is proposed.
Keywords
Data security, Encryption technologies, Privacy
References
G. K. Akhmedov, M. B. Khamraev. (2021). Ma'lumotlarni himoya qilish va ma'lumotlarni boshqarish: nazariya va amaliyot. Tashkent: Tashkent State University Publishing.
B. X. Karimov, Z. M. Shukurov. (2022). Katta ma'lumotlar va ularning xavfsizligi: yangi yondashuvlar va texnologiyalar. Tashkent: Institute of Cybernetics.
I. M. Suyunov, D. A. Rakhmonov. (2023). Ma'lumotlarni himoya qilishda zamonaviy strategiyalar. Journal of Information Security, 15(3), 45-58.
S. A. Usmonov, R. M. Abdullayev. (2022). Sun'iy intellekt va ma'lumotlarni himoya qilish. Journal of Computer Science and Technology, 12(2), 25-40.
R. A. Mirzaev. (2023). Ma'lumotlar xavfsizligi va muvofiqlik: nazariy va amaliy jihatlari. Tashkent: Uzbekistan National University Press.
N. F. Rahimov, O. D. Nematov. (2021). Tizimlar xavfsizligi: ilmiy asoslar va amaliyot. Tashkent: Innovative Technologies Institute.
A. R. Abdurakhmonov, K. B. Inoyatov. (2022). Ma'lumotlarni himoya qilishda yangi yondashuvlar: nazariy va amaliy masalalar. Journal of Data Protection & Privacy, 5(1), 10-20.
D. T. Sultonov. (2024). Digital Transformation and Data Security: Challenges and Solutions. International Journal of Cyber Security and Digital Forensics, 13(4), 78-92.
J. P. Rodriguez, M. T. Gonzalez. (2023). Cybersecurity Strategies for the Future: Innovative Approaches. Journal of Security Studies, 19(2), 122-137.
E. H. Zokirov, S. A. Khamidov. (2023). Data Privacy in the Age of Big Data: Ethical Considerations. Journal of Ethics in Information Technology, 8(3), 101-115.
Article Statistics
Copyright License
Copyright (c) 2025 Akbarova Marguba Khamidovna, Sharipov Bahodir Akilovich, Djangazova Kumriniso Abdulvahobovna, Nurdullaev Alisher Niyatilla ugli

This work is licensed under a Creative Commons Attribution 4.0 International License.