Data Privacy and Protections

For the ongoing discussion of data theory and applications, Science News, an organization that reports research of various subjects, released an article called Theoretical computer science provides answers to data privacy problem. For the purpose of this article, concepts related to the handling of data are discussed, and their applications. Specifically, the purposes that relate data to people are recognizable. Science News (2015) said, “Some data may be trivial, but in many cases, data are deeply personal. They can even influence our insurance premiums or the price we pay for a product online.” An example of a working system model with privacy worked with was reported by Science News as researched by a professor of computer science in Harvard University and former director of the Center of Research on Computation and Society, Salil Vadhan (2015). Described as “differential privacy” (2015), this concept protects data with approximations. With this premise, a series of queries may provide an identifiable pattern; a summation may be reckoned. The calculus of this approximation would then be equivalent to an integral that will produce an exact result. Science News reported that this is defended against by good judgment that would be increasing randomization and taking full care in comparing characteristics across queries (2015). This assessment seems vague because what people view as good judgment depends on initial assumptions about reality.

Although rule utilitarianism, for example, is discussed in contemporary times as a serious ethical concept, there is debate about its efficacy. Bo Brinkman and Alton F. Sanders describe rule utilitarianism. Brinkman and Sanders (2013) said, “In rule utilitarianism, we select a set of rules, and each act is evaluated as to whether it conforms to them” (p. 16). In this case, a rule utilitarian approach might be that the supposedly good judgment of differential privacy is people who may have access will have the keys to accurate information retrieval, and people with incorrect keys will get incorrect values returned to them. In the late 20th century AD, Winslett, et al. (1994) supposed a similar proposal. Winslett et al. (1994) said, “We believe that many of the MLS problems can be resolved by directly addressing the question of what an MLS database means, rather than making syntactic adjustments to avoid semantic problems” (p. 627). This proposal essentially asserted that lying is an effective form of confidentiality for cyber security. Although the supposed truth of relative semantics makes sense for the access key holders for secret information in short term, this causes a failure of integrity. For a historical account, the Apostle Paul discussed the Hebrew Bible. Paul (KJV) said, “As it is written, There is none righteous, no, not one:” (Rom 3:10). This was the view before grace.

As Joachim Biskup showed, lying is not the correct approach. Biskup (2000) said, “The initial belief and the first k-1 answers (lies) would reveal the last secret psi_k.” This is a mathematical statement that reflects a Biblical prophecy. The Son of Man (KJV) said, “Therefore whatsoever ye have spoken in darkness shall be heard in the light; and that which ye have spoken in the ear in closets shall be proclaimed upon the housetops” (Lu 12:3). Therefore, when randomizing data for the purpose of producing lies or untrue information for those who seek unauthorized access to data, I think that more secure concepts require something other than this sort of concept because true information will eventually be revealed, though that may be understood as defense in depth with protections being more understood as unapproachable like the image that a security guard for a crucial represents to attackers, defenders, and other vulnerable groups. Similarly, an available mathematical problem that computers would have difficulty solving would serve as a known defense that would be well defensible in contemporary times.


Biskup, J. (2000). For unknown secrecies refusal is better than lying. Data & Knowledge Engineering, 33(1), 1-23. doi:10.1016/S0169-023X(99)00043-9

Brinkman, W. J., & Sanders, A. F. (2013). Ethics in a Computing Culture. Boston, MA: Cengage Learning.

Marianne Winslett, Kenneth Smith, and Xiaolei Qian. 1994. Formal query languages for secure relational databases. ACM Trans. Database Syst. 19, 4 (December 1994), 626-662. DOI=

National Science Foundation. (2015, October 7). Theoretical computer science provides answers to data privacy problem: New tools allow researchers to share and study sensitive data safely by applying ‘differential privacy’. ScienceDaily. Retrieved December 25, 2016 from


A Proposal for a Power Management System

For the stability and efficiency of power supply and power grid management thus for the benefit of daily human life and work, a power monitoring system was designed based on a smart grid management platform by Jianwei Zhang and Hao Yang. From various data, the mobile service aware opportunistic embedded architecture of mobile crowd sensing networks for power network measurement automation is discussed. Its parts include a mobile crowd sensing network for power grid management, the mobile service aware opportunistic embedded system, and the grid intelligent management of the embedded systems as well as the performance analysis of the embedded system. The core of the intelligent network management is the operation and control scheme of the embedded equipment related to the intelligent power grid. Based on its aspects, including embedded devices and an equipment group of cooperative control among other things, the grid management of intelligent electric power dispatching and intelligent substation of the crowd sensing network management could be realized through the deployment of embedded equipment and a communication network along with singular front-end embedded devices of data perception. As I understand this, the operating system of an Embedded System could communicate with the embedded equipment for the purpose of dispatching electric power. There would be an embedded control equipment testing. Then, embedded logic control followed by a distributed Embedded System (ES) point to point that leads to the connectivity of mobile crowd sensing networks. Then the Mobile Crowd Sensing Networks would communicate to the ES while also sending data to an electric grid server that would, in turn, update the ES. The experimental system has a grid management scope of ten kilometers by twelve kilometers, a power grid management system running time of twenty-four hours, and also a maximum communication distance of one kilometer for embedded mobile devices.

Essentially, this asserted scheme is in a position of superiority to the distributed power management system because of framework complexity, utilization efficiency, and intelligent power grid management level among other aspects. The Biblical Scriptures say much about choice. The Bible says, “No one can serve two masters. Either you will hate the one and love the other, or you will be devoted to the one and despise the other. You cannot serve both God and money” (NIV, Mat 6:24). Jesus the Christ was saying that people must make a choice between the LORD and the desires world. This can be interpreted as accepting the moral imperative of serving the world for the Father. Therefore, I think that this may be applied to the relevance of mobile service aware opportunistic embedded architecture of mobile crowd sensing networks for power network measurement automation, well. The essential data about this are that it offers a more robust framework for applying more efficient energy products for people that are at a greater level in the category of power grid management. With these data, people have an opportunity of experiencing improved lives. I say this because God does not want us suffering. The legal requirement for sin that is death was paid with the life of His son, Immanuel. Therefore, I think that this is a good system that should be considered for better life and for God’s namesake. This is in agreement with Zhang and Yang, and with the integrated faith position that the morality of technological advancement validates the existence of its state of change throughout history.

Zhang, J., & Yang, H. (2016). Mobile service aware opportunistic embedded architecture of mobile crowd sensing networks for power network measurement. EURASIP Journal On Embedded Systems, 2016(1), 1-9. doi:10.1186/s13639-016-0023-0