Data sovereignty and security in network engineering: A conceptual framework for compliance

Michael Oladipo Akinsanya 1, *, Cynthia Chizoba Ekechi 2 and Chukwuekem David Okeke 3

1 Independent Researcher, Frisco, Texas, USA.
2 Zustech Ltd, United Kingdom.
3 Tranter IT Infrastructure Services Limited, Nigeria.
 
Review
International Journal of Science and Research Archive, 2024, 11(02), 1832–1847.
Article DOI: 10.30574/ijsra.2024.11.2.0682
 
Publication history: 
Received on 12 March 2024; revised on 20 April 2024; accepted on 23 April 2024
 
Abstract: 
Data sovereignty and security are critical issues in network engineering, particularly in an era of increasing data breaches and regulatory scrutiny. This concept paper presents a conceptual framework for understanding and ensuring compliance with data sovereignty and security requirements in network engineering. The framework begins by defining data sovereignty and security in the context of network engineering, highlighting the importance of protecting data from unauthorized access and ensuring that it is stored and processed in compliance with applicable laws and regulations. Next, the framework explores key concepts and principles related to data sovereignty and security, such as data localization, encryption, and access control. It also discusses the role of international agreements and standards in shaping data sovereignty and security requirements. The framework then guides how organizations can implement measures to protect data sovereignty and security in their network engineering practices. This includes conducting risk assessments, implementing appropriate security controls, and ensuring compliance with relevant laws and regulations. Finally, the framework outlines future trends and challenges in data sovereignty and security, such as the impact of emerging technologies like 5G and the Internet of Things (IoT) on data protection requirements. Overall, this concept paper provides a comprehensive overview of data sovereignty and security in network engineering, offering practical guidance for organizations seeking to protect their data and comply with relevant laws and regulations.
 
Keywords: 
Data sovereignty; Data security; Network engineering; Regulatory scrutiny; compliance
 
Full text article in PDF: