Methods and Tools for Personal Data Protection in Big Data: Analysis of Uzbekistan’s Legal Framework


DOI:
https://doi.org/10.59022/ijlp.322Keywords:
Big Data, Personal Data Protection, Anonymization, Pseudonymization, Privacy Notices, Data Protection Law, UzbekistanAbstract
This study examines methods and tools for protecting personal data in the Big Data context, with a focus on Uzbekistan’s legal framework. The research analyzes anonymization, pseudonymization, privacy notices, privacy impact assessments, privacy by design, and ethical approaches to data protection. Through comparative analysis with international standards such as GDPR, the study identifies significant gaps in Uzbekistan’s “On Personal Data” law, which lacks specific provisions on modern data protection tools. Research findings reveal that while basic protections exist, Uzbekistan’s legislation requires enhancement to address Big Data challenges effectively. This paper proposes legislative amendments to include comprehensive anonymization guidelines, formal pseudonymization processes, and privacy impact assessment requirements. Additional recommendations include establishing personal data repositories, implementing privacy certification mechanisms, and developing national data ethics principles. These measures would strengthen Uzbekistan’s data protection framework while enabling innovation in the digital economy, balancing technological advancement with individual privacy rights.
References
Acciarini, C., Cappa, F., Boccardelli, P., & Oriani, R. (2023). How can organizations leverage big data to innovate their business models? A systematic literature review. Technovation, 123, 102713. https://doi.org/10.1016/j.technovation.2023.102713 DOI: https://doi.org/10.1016/j.technovation.2023.102713
Ajah, I. A., & Nweke, H. F. (2019). Big Data and Business Analytics: Trends, Platforms, Success Factors and Applications. Big Data and Cognitive Computing, 3(2), 32. https://doi.org/10.3390/bdcc3020032 DOI: https://doi.org/10.3390/bdcc3020032
Allah Rakha, N. (2023). Artificial Intelligence strategy of the Uzbekistan: Policy framework, Preferences, and challenges. International Journal of Law and Policy, 1(1). https://doi.org/10.59022/ijlp.27 DOI: https://doi.org/10.59022/ijlp.27
AllahRakha, N. (2024). Constitutional Safeguards for Digital Rights and Privacy. International Journal of Law and Policy, 2(4), 31–43. https://doi.org/10.59022/ijlp.172 DOI: https://doi.org/10.59022/ijlp.172
Bormida, M. Da. (2021). The Big Data World: Benefits, Threats and Ethical Challenges (pp. 71–91). https://doi.org/10.1108/S2398-601820210000008007 DOI: https://doi.org/10.1108/S2398-601820210000008007
Jain, A. K., Sahoo, S. R., & Kaubiyal, J. (2021). Online social networks security and privacy: comprehensive review and analysis. Complex & Intelligent Systems, 7(5), 2157–2177. https://doi.org/10.1007/s40747-021-00409-7 DOI: https://doi.org/10.1007/s40747-021-00409-7
Obar, J. A. (2015). Big Data and The Phantom Public : Walter Lippmann and the fallacy of data privacy self-management. Big Data & Society, 2(2). https://doi.org/10.1177/2053951715608876 DOI: https://doi.org/10.1177/2053951715608876
Ortega-Fernandez, I., Martinez, S. E. K., & Orellana, L. A. (2022). Large Scale Data Anonymisation for GDPR Compliance. In Big Data and Artificial Intelligence in Digital Finance (pp. 325–335). Springer International Publishing. https://doi.org/10.1007/978-3-030-94590-9_19 DOI: https://doi.org/10.1007/978-3-030-94590-9_19
Rupp, V., & von Grafenstein, M. (2024). Clarifying “personal data” and the role of anonymisation in data protection law: Including and excluding data from the scope of the GDPR (more clearly) through refining the concept of data protection. Computer Law & Security Review, 52, 105932. https://doi.org/10.1016/j.clsr.2023.105932 DOI: https://doi.org/10.1016/j.clsr.2023.105932
Tinabo, R., Mtenzi, F., & O’Shea, B. (2009). Anonymisation vs. Pseudonymisation: Which one is most useful for both privacy protection and usefulness of e-healthcare data. 2009 International Conference for Internet Technology and Secured Transactions, (ICITST), 1–6. https://doi.org/10.1109/ICITST.2009.5402501 DOI: https://doi.org/10.1109/ICITST.2009.5402501
Toom, K., & Miller, P. F. (2018). Ethics and Integrity. In The European Research Management Handbook (pp. 263–287). Elsevier. https://doi.org/10.1016/B978-0-12-805059-0.00013-4 DOI: https://doi.org/10.1016/B978-0-12-805059-0.00013-4
Varanda, A., Santos, L., Costa, R. L. de C., Oliveira, A., & Rabadão, C. (2021). Log pseudonymization: Privacy maintenance in practice. Journal of Information Security and Applications, 63, 103021. https://doi.org/10.1016/j.jisa.2021.103021 DOI: https://doi.org/10.1016/j.jisa.2021.103021
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2025 Sardor Mamanazarov

This work is licensed under a Creative Commons Attribution 4.0 International License.