The PII Protect System is designed as a web application with the following functionality:
- Image Upload: Users can upload images containing PII.
- OCR Extraction: Optical Character Recognition (OCR) is used to extract details from the document.
- PII Detection: The system checks for sensitive information.
- User Control: Based on user input, the system either displays the data or verifies the manager's ID before sending it securely.
- Data Encryption: All extracted text is encrypted using AES, and the masked document is stored as a secure blob.
- Manager Access: Managers can view and manage user data after logging in with their ID.
- Encryption: AES for securing sensitive data
- Storage: Blob storage for encrypted document storage
- OCR: Tesseract for text extraction
- High Demand: Increasing digital records handling PII like Aadhaar cards make this system relevant.
- Technological Infrastructure: Web-based systems are feasible due to India’s robust internet infrastructure and adoption of cloud services.
- Regulatory Compliance: Aligns with data protection laws like IT Act, DPDP Bill 2023, etc.
- Challenges: Ensuring user awareness, managing managerial misuse, and addressing potential data breaches.
- Enhanced Privacy Protection: Reduces risks of identity theft and unauthorized data access.
- Increased Trust: Strong encryption and access control build user confidence.
- Educational Value: Promotes responsible data handling by users and managers.
- Compliance: Ensures adherence to India’s data protection laws.
- Regulatory Compliance: Complex rules around the DPDP Bill.
- User Awareness: Low user knowledge of data masking and security.
- Managerial Misuse: Risk of sensitive data misuse by managers.
- Cybersecurity Threats: Despite encryption, cyberattacks remain a risk.
- Rudra Jena
- Srujan Rana
- Debasish Mohanty
- Chetak Kumar Majhi