Pervasive User Data Collection from Cyberspace: Privacy Concerns and Countermeasures
The increasing use of technologies, particularly computing and communication paradigms, has significantly influenced our daily lives. Interconnecting devices and networks provides convenient platforms for information exchange and facilitates pervasive user data collection. This new environment prese...
Saved in:
Published in | Cryptography Vol. 8; no. 1; p. 5 |
---|---|
Main Authors | , , , , , , , |
Format | Journal Article |
Language | English |
Published |
Basel
MDPI AG
01.01.2024
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | The increasing use of technologies, particularly computing and communication paradigms, has significantly influenced our daily lives. Interconnecting devices and networks provides convenient platforms for information exchange and facilitates pervasive user data collection. This new environment presents serious privacy challenges. User activities can be continuously monitored in both digital and physical realms. Gathered data can be aggregated and analysed, revealing aspects of user behaviour that may not be apparent from a single data point. The very items that facilitate connectivity simultaneously increase the risk of privacy breaches. The data gathered to provide services can also be used for monitoring and surveillance. This paper discerns three novel categories of privacy concerns relating to pervasive user data collection: privacy and user activity in cyberspace, privacy in personal cyber–physical systems, and privacy in proactive user-driven data collection. We emphasise the primary challenges, ranging from identity tracking in browsing histories to intricate issues in opportunistic networks, situating each within practical, real-world scenarios. Furthermore, we assess the effectiveness of current countermeasures, investigating their strengths and limitations. This paper explores the challenges in preserving privacy in user interactions with dynamic interconnected systems and suggests countermeasures to mitigate identified privacy risks. |
---|---|
AbstractList | The increasing use of technologies, particularly computing and communication paradigms, has significantly influenced our daily lives. Interconnecting devices and networks provides convenient platforms for information exchange and facilitates pervasive user data collection. This new environment presents serious privacy challenges. User activities can be continuously monitored in both digital and physical realms. Gathered data can be aggregated and analysed, revealing aspects of user behaviour that may not be apparent from a single data point. The very items that facilitate connectivity simultaneously increase the risk of privacy breaches. The data gathered to provide services can also be used for monitoring and surveillance. This paper discerns three novel categories of privacy concerns relating to pervasive user data collection: privacy and user activity in cyberspace, privacy in personal cyber–physical systems, and privacy in proactive user-driven data collection. We emphasise the primary challenges, ranging from identity tracking in browsing histories to intricate issues in opportunistic networks, situating each within practical, real-world scenarios. Furthermore, we assess the effectiveness of current countermeasures, investigating their strengths and limitations. This paper explores the challenges in preserving privacy in user interactions with dynamic interconnected systems and suggests countermeasures to mitigate identified privacy risks. |
Audience | Academic |
Author | Zhao, Zhen Le, Zung Simpson, Leonie Ruth Zia, Tanveer Jiang, Yinhao Gauravaram, Praveen Rezazadeh Baee, Mir Ali Pieprzyk, Josef |
Author_xml | – sequence: 1 givenname: Yinhao orcidid: 0000-0002-1733-9479 surname: Jiang fullname: Jiang, Yinhao – sequence: 2 givenname: Mir Ali orcidid: 0000-0003-1575-7287 surname: Rezazadeh Baee fullname: Rezazadeh Baee, Mir Ali – sequence: 3 givenname: Leonie Ruth surname: Simpson fullname: Simpson, Leonie Ruth – sequence: 4 givenname: Praveen surname: Gauravaram fullname: Gauravaram, Praveen – sequence: 5 givenname: Josef orcidid: 0000-0002-1917-6466 surname: Pieprzyk fullname: Pieprzyk, Josef – sequence: 6 givenname: Tanveer orcidid: 0000-0003-3802-5687 surname: Zia fullname: Zia, Tanveer – sequence: 7 givenname: Zhen orcidid: 0000-0003-2654-624X surname: Zhao fullname: Zhao, Zhen – sequence: 8 givenname: Zung surname: Le fullname: Le, Zung |
BookMark | eNp9kUFrGzEQhUVJoWmSX9DLQs9OpNXKknoLbpsGAs0hgd7EWBq5MuvVdrQ27L-vEpdQQik6SBre9-bBe89OhjwgYx8Ev5TS8itP8zjlDcH4czZccM7VG3badoIvpNE_Tv56v2MXpWyrouVGG21P2cM90gFKOmDzWJCazzBBs8p9j35KeWgi5V2zmtdIZQSPn5p7Sgfwc9UMHmkoDQyhfvbDhLRDKHvCcs7eRugLXvy5z9jj1y8Pq2-Lu-83t6vru4XvWj0tPA9BciFRLzsekVuuWlyHGFovBISgTDQ2WDBqiUaZLkZACxBbz5VHAfKM3R59Q4atGyntgGaXIbnnQaaNA5qS79F1oqbvgjQGTQdWrZdBoLbemGDABFW9Ph69Rsq_9lgmt817Gmp811rLW6sl11V1eVRtoJqmIeaJwNcTcJd87SWmOr_WxrSdUmJZAXkEPOVSCONLTMHdU33uH_VVyr6ifJrgqZC6LvX_ZX8D5xKoWw |
CitedBy_id | crossref_primary_10_3390_cryptography8030039 crossref_primary_10_1108_ITP_03_2024_0396 |
Cites_doi | 10.1080/02564602.2017.1304834 10.1007/978-3-540-73538-0_4 10.1109/69.971193 10.1177/000271626837700157 10.1109/TDSC.2019.2927695 10.1145/3319535.3354222 10.1109/SDS.2017.7939154 10.1016/j.future.2016.06.001 10.1145/1066116.1189037 10.1145/1809842.1809864 10.1109/ICICCT.2017.7975184 10.1109/VNC.2013.6737599 10.1016/j.adhoc.2016.02.011 10.1109/TIFS.2021.3087359 10.1016/j.pmcj.2017.07.009 10.1109/SP40000.2020.00005 10.1109/ACCESS.2021.3060046 10.1145/3133956.3134086 10.1109/CTS.2012.6261095 10.1109/JSYST.2016.2550538 10.1016/j.clsr.2017.06.006 10.1186/s13638-015-0353-y 10.1109/OJVT.2022.3217552 10.1016/j.ifacol.2022.07.043 10.1109/RFID.2011.5764619 10.1137/1.9781611975482.151 10.1109/JSYST.2016.2550530 10.1145/362686.362692 10.1007/978-3-662-48116-5_22 10.1145/2213836.2213910 10.1145/3132847.3132998 10.1109/HPCC-DSS-SmartCity-DependSys57074.2022.00102 10.1007/978-3-030-26834-3_8 10.1145/2660267.2660348 10.1145/3183713.3196906 10.1109/INFOCOM.2017.8056978 10.1007/978-3-642-14527-8_1 10.1016/j.jnca.2019.06.017 10.1109/COMST.2019.2899354 10.1007/978-3-662-53008-5_5 10.1109/ACCESS.2016.2526060 10.1109/JCN.2011.6157417 10.1145/3336191.3371856 10.1109/ICC.2012.6364252 10.1080/09720529.2021.1873254 10.1109/INFOCOM.2019.8737527 10.3390/en81011883 10.46586/tosc.v2017.i1.80-105 10.1109/TENCON.2018.8650067 10.1109/INFOCOM.2014.6848002 10.1109/OSSCOM.2015.7372685 10.1109/ICME46284.2020.9102875 10.4108/eai.19-8-2015.2260862 10.46586/tosc.v2017.i1.4-44 10.1109/CVPR46437.2021.00641 10.1109/SP.2017.14 10.1007/978-3-642-31594-7_39 10.1145/1234161.1234179 10.1109/TVT.2021.3097088 10.1515/popets-2015-0006 10.1145/1460412.1460440 10.1080/01621459.1965.10480775 10.1109/SP.2018.00035 10.1016/j.pmcj.2009.04.001 10.1007/978-3-662-53887-6_18 10.1145/2976749.2978313 10.1109/TDSC.2023.3345406 10.1109/MITP.2018.2876985 10.1007/11428572_10 10.2139/ssrn.1446862 10.1109/TVT.2019.2945339 10.3390/app6030068 10.1007/11681878_14 10.1007/978-3-642-22792-9_13 10.46586/tosc.v2016.i2.52-79 10.1109/ICHI.2013.40 10.1109/EuroSP.2017.26 |
ContentType | Journal Article |
Copyright | COPYRIGHT 2024 MDPI AG 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. |
Copyright_xml | – notice: COPYRIGHT 2024 MDPI AG – notice: 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License. |
DBID | AAYXX CITATION 8FE 8FG ABUWG AFKRA ARAPS AZQEC BENPR BGLVJ CCPQU DWQXO HCIFZ P5Z P62 PHGZM PHGZT PIMPY PKEHL PQEST PQGLB PQQKQ PQUKI DOA |
DOI | 10.3390/cryptography8010005 |
DatabaseName | CrossRef ProQuest SciTech Collection ProQuest Technology Collection ProQuest Central (Alumni) ProQuest Central UK/Ireland Advanced Technologies & Aerospace Collection ProQuest Central Essentials ProQuest Central Technology Collection ProQuest One Community College ProQuest Central Korea ProQuest SciTech Premium Collection Advanced Technologies & Aerospace Database ProQuest Advanced Technologies & Aerospace Collection ProQuest Central Premium ProQuest One Academic Publicly Available Content Database ProQuest One Academic Middle East (New) ProQuest One Academic Eastern Edition (DO NOT USE) ProQuest One Applied & Life Sciences ProQuest One Academic ProQuest One Academic UKI Edition DOAJ Directory of Open Access Journals |
DatabaseTitle | CrossRef Publicly Available Content Database Advanced Technologies & Aerospace Collection Technology Collection ProQuest One Academic Middle East (New) ProQuest Advanced Technologies & Aerospace Collection ProQuest Central Essentials ProQuest One Academic Eastern Edition ProQuest Central (Alumni Edition) SciTech Premium Collection ProQuest One Community College ProQuest Technology Collection ProQuest SciTech Collection ProQuest Central Advanced Technologies & Aerospace Database ProQuest One Applied & Life Sciences ProQuest One Academic UKI Edition ProQuest Central Korea ProQuest Central (New) ProQuest One Academic ProQuest One Academic (New) |
DatabaseTitleList | Publicly Available Content Database CrossRef |
Database_xml | – sequence: 1 dbid: DOA name: DOAJ Directory of Open Access Journals url: https://www.doaj.org/ sourceTypes: Open Website – sequence: 2 dbid: 8FG name: ProQuest Technology Collection url: https://search.proquest.com/technologycollection1 sourceTypes: Aggregation Database |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Computer Science |
EISSN | 2410-387X |
ExternalDocumentID | oai_doaj_org_article_41ace4d388e84a95b6d1e79c88d8a8d5 A788245516 10_3390_cryptography8010005 |
GeographicLocations | Australia United States Germany |
GeographicLocations_xml | – name: Germany – name: Australia – name: United States |
GroupedDBID | 8FE 8FG AADQD AAYXX ADBBV AFKRA AFZYC ALMA_UNASSIGNED_HOLDINGS ARAPS BCNDV BENPR BGLVJ CCPQU CITATION GROUPED_DOAJ HCIFZ IAO ITC MODMG M~E OK1 P62 PHGZM PHGZT PIMPY PROAC PMFND ABUWG AZQEC DWQXO PKEHL PQEST PQGLB PQQKQ PQUKI PUEGO |
ID | FETCH-LOGICAL-c427t-c0dd3013e7640fe09052ebdfd2c11add58f89d9a856e8584ffae9aaf2c05ce1a3 |
IEDL.DBID | DOA |
ISSN | 2410-387X |
IngestDate | Wed Aug 27 01:27:34 EDT 2025 Fri Jul 25 06:14:18 EDT 2025 Tue Jun 10 21:10:50 EDT 2025 Thu Apr 24 22:53:26 EDT 2025 Tue Jul 01 03:56:28 EDT 2025 |
IsDoiOpenAccess | true |
IsOpenAccess | true |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 1 |
Language | English |
License | https://creativecommons.org/licenses/by/4.0 |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c427t-c0dd3013e7640fe09052ebdfd2c11add58f89d9a856e8584ffae9aaf2c05ce1a3 |
Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
ORCID | 0000-0002-1917-6466 0000-0002-1733-9479 0000-0003-3802-5687 0000-0003-2654-624X 0000-0003-1575-7287 |
OpenAccessLink | https://doaj.org/article/41ace4d388e84a95b6d1e79c88d8a8d5 |
PQID | 2990297307 |
PQPubID | 2055420 |
ParticipantIDs | doaj_primary_oai_doaj_org_article_41ace4d388e84a95b6d1e79c88d8a8d5 proquest_journals_2990297307 gale_infotracacademiconefile_A788245516 crossref_primary_10_3390_cryptography8010005 crossref_citationtrail_10_3390_cryptography8010005 |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | 20240101 |
PublicationDateYYYYMMDD | 2024-01-01 |
PublicationDate_xml | – month: 01 year: 2024 text: 20240101 day: 01 |
PublicationDecade | 2020 |
PublicationPlace | Basel |
PublicationPlace_xml | – name: Basel |
PublicationTitle | Cryptography |
PublicationYear | 2024 |
Publisher | MDPI AG |
Publisher_xml | – name: MDPI AG |
References | ref_94 Zhao (ref_18) 2022; 54 ref_93 Azam (ref_130) 2021; 9 Akalu (ref_129) 2018; 34 ref_139 Conti (ref_1) 2017; 41 ref_90 ref_14 ref_12 Abouarork (ref_104) 2021; 24 ref_131 Simpson (ref_140) 2023; 20 ref_11 ref_99 ref_10 ref_98 ref_133 ref_97 ref_96 ref_95 ref_134 ref_19 ref_17 ref_16 Irshad (ref_102) 2018; 12 ref_15 Baee (ref_141) 2023; 4 ref_126 ref_128 ref_25 ref_24 Perta (ref_13) 2015; 2015 ref_23 ref_22 ref_21 Rahman (ref_79) 2017; 72 ref_122 ref_20 ref_121 Banik (ref_92) 2019; 1 Samarati (ref_111) 2001; 13 ref_29 ref_28 ref_27 ref_26 ref_72 ref_71 ref_70 ref_78 ref_77 ref_76 ref_75 Cook (ref_143) 2009; 5 Warner (ref_46) 1965; 60 Tsai (ref_101) 2016; 44 Palaniswamy (ref_136) 2020; 25 Kim (ref_74) 2011; 13 Wu (ref_125) 2016; 10 Wang (ref_50) 2019; 18 ref_83 ref_82 ref_81 Alajeely (ref_103) 2018; 35 ref_89 ref_142 ref_88 ref_87 ref_144 ref_86 ref_85 ref_84 Avoussoukpo (ref_118) 2020; 22 Kumar (ref_127) 2019; 21 Ravidas (ref_73) 2019; 144 ref_58 ref_57 ref_56 ref_55 ref_54 ref_53 Salomatin (ref_35) 2022; 55 ref_52 ref_51 Baee (ref_116) 2021; 16 ref_59 ref_61 ref_69 ref_68 ref_67 ref_66 Soleymani (ref_132) 2015; 2015 ref_65 ref_64 Fraenkel (ref_2) 1968; 377 ref_63 Diez (ref_80) 2019; 21 ref_62 Baee (ref_138) 2021; 2021 ref_115 ref_114 ref_117 ref_119 Saxena (ref_123) 2015; 8 Wu (ref_124) 2016; 10 ref_36 ref_34 Baee (ref_135) 2019; 68 ref_33 ref_32 ref_31 ref_110 ref_30 ref_113 ref_112 Bloom (ref_47) 1970; 13 ref_39 ref_38 Kubo (ref_91) 2019; Volume 11689 ref_37 Xue (ref_60) 2022; 35 ref_106 Kuo (ref_120) 2014; 19 ref_105 ref_108 ref_109 Baee (ref_137) 2021; 70 ref_45 ref_44 ref_43 ref_100 ref_42 ref_41 ref_40 Schoeman (ref_3) 1984; 21 Hara (ref_107) 2016; 4 ref_49 ref_48 ref_9 ref_8 ref_5 ref_4 ref_7 ref_6 |
References_xml | – volume: 35 start-page: 369 year: 2018 ident: ref_103 article-title: Routing protocols in opportunistic networks—A survey publication-title: IETE Tech. Rev. doi: 10.1080/02564602.2017.1304834 – ident: ref_110 doi: 10.1007/978-3-540-73538-0_4 – volume: 12 start-page: 523 year: 2018 ident: ref_102 article-title: Cryptanalysis and improvement of a Multi-server Authentication protocol by Lu et al publication-title: KSII Trans. Internet Inf. Syst. – volume: 13 start-page: 1010 year: 2001 ident: ref_111 article-title: Protecting respondents identities in microdata release publication-title: IEEE Trans. Knowl. Data Eng. doi: 10.1109/69.971193 – volume: 377 start-page: 196 year: 1968 ident: ref_2 article-title: ALAN F. WESTIN. Privacy and Freedom. Pp. xvi. New York: Atheneum, 1967. $10.00 publication-title: Ann. Am. Acad. Political Soc. Sci. doi: 10.1177/000271626837700157 – ident: ref_68 – volume: 18 start-page: 982 year: 2019 ident: ref_50 article-title: Locally differentially private heavy hitter identification publication-title: IEEE Trans. Dependable Secur. Comput. doi: 10.1109/TDSC.2019.2927695 – ident: ref_65 – ident: ref_88 – ident: ref_39 doi: 10.1145/3319535.3354222 – ident: ref_71 doi: 10.1109/SDS.2017.7939154 – volume: 72 start-page: 339 year: 2017 ident: ref_79 article-title: A privacy preserving framework for RFID based healthcare systems publication-title: Future Gener. Comput. Syst. doi: 10.1016/j.future.2016.06.001 – ident: ref_112 doi: 10.1145/1066116.1189037 – ident: ref_70 doi: 10.1145/1809842.1809864 – ident: ref_100 doi: 10.1109/ICICCT.2017.7975184 – ident: ref_134 doi: 10.1109/VNC.2013.6737599 – volume: 44 start-page: 19 year: 2016 ident: ref_101 article-title: Provably secure anonymous authentication with batch verification for mobile roaming services publication-title: Ad Hoc Netw. doi: 10.1016/j.adhoc.2016.02.011 – volume: 22 start-page: 118 year: 2020 ident: ref_118 article-title: Ensuring Users Privacy and Mutual Authentication in Opportunistic Networks: A Survey publication-title: Int. J. Netw. Secur. – volume: 16 start-page: 3678 year: 2021 ident: ref_116 article-title: On the Efficiency of Pairing-Based Authentication for Connected Vehicles: Time Is Not on Our Side! publication-title: IEEE Trans. Inf. Forensics Secur. doi: 10.1109/TIFS.2021.3087359 – volume: 21 start-page: 199 year: 1984 ident: ref_3 article-title: Privacy: Philosophical Dimensions publication-title: Am. Philos. Q. – volume: 41 start-page: 1 year: 2017 ident: ref_1 article-title: The Internet of People (IoP): A new wave in pervasive mobile computing publication-title: Pervasive Mob. Comput. doi: 10.1016/j.pmcj.2017.07.009 – ident: ref_114 – ident: ref_4 – ident: ref_31 – ident: ref_56 – ident: ref_42 doi: 10.1109/SP40000.2020.00005 – ident: ref_27 – volume: 9 start-page: 31309 year: 2021 ident: ref_130 article-title: A comprehensive review of authentication schemes in vehicular ad-hoc network publication-title: IEEE Access doi: 10.1109/ACCESS.2021.3060046 – ident: ref_10 – ident: ref_54 doi: 10.1145/3133956.3134086 – ident: ref_128 – ident: ref_77 doi: 10.1109/CTS.2012.6261095 – volume: 10 start-page: 873 year: 2016 ident: ref_125 article-title: Big data meet green challenges: Greening big data publication-title: IEEE Syst. J. doi: 10.1109/JSYST.2016.2550538 – volume: 34 start-page: 37 year: 2018 ident: ref_129 article-title: Privacy, consent and vehicular ad hoc networks (VANETs) publication-title: Comput. Law Secur. Rev. doi: 10.1016/j.clsr.2017.06.006 – volume: 25 start-page: 100255 year: 2020 ident: ref_136 article-title: Continuous authentication for VANET publication-title: Veh. Commun. – ident: ref_45 – volume: 2015 start-page: 146 year: 2015 ident: ref_132 article-title: Trust management in vehicular ad hoc network: A systematic review publication-title: EURASIP J. Wirel. Commun. Netw. doi: 10.1186/s13638-015-0353-y – ident: ref_28 – ident: ref_53 – volume: 4 start-page: 101 year: 2023 ident: ref_141 article-title: The Security of “2FLIP” Authentication Scheme for VANETs: Attacks and Rectifications publication-title: IEEE Open J. Veh. Technol. doi: 10.1109/OJVT.2022.3217552 – ident: ref_30 – ident: ref_115 – ident: ref_121 – ident: ref_11 – volume: 55 start-page: 244 year: 2022 ident: ref_35 article-title: Comparison of the Effectiveness of Countermeasures Against Tracking User Browser Fingerprints publication-title: IFAC-PapersOnLine doi: 10.1016/j.ifacol.2022.07.043 – ident: ref_67 – ident: ref_14 – ident: ref_94 doi: 10.1109/RFID.2011.5764619 – ident: ref_59 doi: 10.1137/1.9781611975482.151 – volume: 10 start-page: 888 year: 2016 ident: ref_124 article-title: Big data meet green challenges: Big data toward green applications publication-title: IEEE Syst. J. doi: 10.1109/JSYST.2016.2550530 – volume: 13 start-page: 422 year: 1970 ident: ref_47 article-title: Space/Time Trade-offs in Hash Coding with Allowable Errors publication-title: Commun. ACM doi: 10.1145/362686.362692 – ident: ref_95 doi: 10.1007/978-3-662-48116-5_22 – ident: ref_17 doi: 10.1145/2213836.2213910 – ident: ref_75 – ident: ref_25 – ident: ref_81 – ident: ref_33 – ident: ref_122 doi: 10.1145/3132847.3132998 – volume: 2021 start-page: 1 year: 2021 ident: ref_138 article-title: Authentication strategies in vehicular communications: A taxonomy and framework publication-title: EURASIP J. Wirel. Commun. Netw. – ident: ref_61 doi: 10.1109/HPCC-DSS-SmartCity-DependSys57074.2022.00102 – volume: Volume 11689 start-page: 129 year: 2019 ident: ref_91 article-title: Tweakable TWINE: Building a Tweakable Block Cipher on Generalized Feistel Structure publication-title: Proceedings of the Advances in Information and Computer Security: 14th International Workshop on Security, IWSEC 2019 doi: 10.1007/978-3-030-26834-3_8 – ident: ref_44 doi: 10.1145/2660267.2660348 – ident: ref_52 doi: 10.1145/3183713.3196906 – ident: ref_64 – ident: ref_36 – ident: ref_106 doi: 10.1109/INFOCOM.2017.8056978 – ident: ref_19 – ident: ref_22 – volume: 1 start-page: 157 year: 2019 ident: ref_92 article-title: Sundae-gift publication-title: Submiss. Round – ident: ref_6 doi: 10.1007/978-3-642-14527-8_1 – volume: 144 start-page: 79 year: 2019 ident: ref_73 article-title: Access control in Internet-of-Things: A survey publication-title: J. Netw. Comput. Appl. doi: 10.1016/j.jnca.2019.06.017 – volume: 21 start-page: 2886 year: 2019 ident: ref_127 article-title: Smart grid metering networks: A survey on security, privacy and open research issues publication-title: IEEE Commun. Surv. Tutorials doi: 10.1109/COMST.2019.2899354 – ident: ref_78 – ident: ref_89 doi: 10.1007/978-3-662-53008-5_5 – ident: ref_49 – ident: ref_32 – ident: ref_55 – ident: ref_26 – volume: 4 start-page: 673 year: 2016 ident: ref_107 article-title: Dummy-based user location anonymization under real-world constraints publication-title: IEEE Access doi: 10.1109/ACCESS.2016.2526060 – volume: 13 start-page: 175 year: 2011 ident: ref_74 article-title: Access right assignment mechanisms for secure home networks publication-title: J. Commun. Netw. doi: 10.1109/JCN.2011.6157417 – ident: ref_84 – ident: ref_66 doi: 10.1145/3336191.3371856 – ident: ref_117 doi: 10.1109/ICC.2012.6364252 – volume: 20 start-page: 1799 year: 2023 ident: ref_140 article-title: ALI: Anonymous Lightweight Inter-Vehicle Broadcast Authentication with Encryption publication-title: IEEE Trans. Dependable Secur. Comput. – volume: 24 start-page: 1689 year: 2021 ident: ref_104 article-title: Authentication in opportunistic networks: State and art publication-title: J. Discret. Math. Sci. Cryptogr. doi: 10.1080/09720529.2021.1873254 – ident: ref_23 – ident: ref_57 doi: 10.1109/INFOCOM.2019.8737527 – ident: ref_58 – ident: ref_98 – volume: 8 start-page: 11883 year: 2015 ident: ref_123 article-title: State of the art authentication, access control, and secure integration in smart grid publication-title: Energies doi: 10.3390/en81011883 – ident: ref_97 doi: 10.46586/tosc.v2017.i1.80-105 – ident: ref_69 doi: 10.1109/TENCON.2018.8650067 – ident: ref_139 – ident: ref_8 – ident: ref_113 doi: 10.1109/INFOCOM.2014.6848002 – ident: ref_82 doi: 10.1109/OSSCOM.2015.7372685 – ident: ref_62 doi: 10.1109/ICME46284.2020.9102875 – ident: ref_119 doi: 10.4108/eai.19-8-2015.2260862 – ident: ref_87 – ident: ref_90 doi: 10.46586/tosc.v2017.i1.4-44 – ident: ref_41 – ident: ref_63 doi: 10.1109/CVPR46437.2021.00641 – ident: ref_83 doi: 10.1109/SP.2017.14 – ident: ref_38 – ident: ref_131 – volume: 35 start-page: 6784 year: 2022 ident: ref_60 article-title: DDRM: A continual frequency estimation mechanism with local differential privacy publication-title: IEEE Trans. Knowl. Data Eng. – ident: ref_48 doi: 10.1007/978-3-642-31594-7_39 – ident: ref_72 – ident: ref_9 doi: 10.1145/1234161.1234179 – ident: ref_20 – ident: ref_7 – volume: 70 start-page: 9306 year: 2021 ident: ref_137 article-title: A Model to Evaluate Reliability of Authentication Protocols in C-ITS Safety-Critical Applications publication-title: IEEE Trans. Veh. Technol. doi: 10.1109/TVT.2021.3097088 – volume: 2015 start-page: 77 year: 2015 ident: ref_13 article-title: A glance through the VPN looking glass: IPv6 leakage and DNS hijacking in commercial VPN clients publication-title: Proc. Priv. Enhancing Technol. doi: 10.1515/popets-2015-0006 – ident: ref_109 doi: 10.1145/1460412.1460440 – ident: ref_144 – volume: 60 start-page: 63 year: 1965 ident: ref_46 article-title: Randomized response: A survey technique for eliminating evasive answer bias publication-title: J. Am. Stat. Assoc. doi: 10.1080/01621459.1965.10480775 – ident: ref_51 doi: 10.1109/SP.2018.00035 – volume: 5 start-page: 277 year: 2009 ident: ref_143 article-title: Ambient intelligence: Technologies, applications, and opportunities publication-title: Pervasive Mob. Comput. doi: 10.1016/j.pmcj.2009.04.001 – ident: ref_24 – ident: ref_34 – ident: ref_93 doi: 10.1007/978-3-662-53887-6_18 – ident: ref_15 doi: 10.1145/2976749.2978313 – ident: ref_142 doi: 10.1109/TDSC.2023.3345406 – volume: 21 start-page: 50 year: 2019 ident: ref_80 article-title: Lightweight Access Control System for Wearable Devices publication-title: IT Prof. doi: 10.1109/MITP.2018.2876985 – ident: ref_40 – ident: ref_37 – volume: 19 start-page: 18 year: 2014 ident: ref_120 article-title: An efficient and secure anonymous mobility network authentication scheme publication-title: J. Inf. Secur. Appl. – ident: ref_21 – ident: ref_108 doi: 10.1007/11428572_10 – ident: ref_5 doi: 10.2139/ssrn.1446862 – ident: ref_29 – ident: ref_85 – volume: 54 start-page: 1 year: 2022 ident: ref_18 article-title: A survey on differential privacy for unstructured data content publication-title: ACM Comput. Surv. (CSUR) – volume: 68 start-page: 11577 year: 2019 ident: ref_135 article-title: Broadcast Authentication in Latency-Critical Applications: On the Efficiency of IEEE 1609.2 publication-title: IEEE Trans. Veh. Technol. doi: 10.1109/TVT.2019.2945339 – ident: ref_126 doi: 10.3390/app6030068 – ident: ref_16 doi: 10.1007/11681878_14 – ident: ref_86 doi: 10.1007/978-3-642-22792-9_13 – ident: ref_96 doi: 10.46586/tosc.v2016.i2.52-79 – ident: ref_133 – ident: ref_43 – ident: ref_76 doi: 10.1109/ICHI.2013.40 – ident: ref_105 – ident: ref_12 doi: 10.1109/EuroSP.2017.26 – ident: ref_99 |
SSID | ssj0002087879 |
Score | 2.2773685 |
SecondaryResourceType | review_article |
Snippet | The increasing use of technologies, particularly computing and communication paradigms, has significantly influenced our daily lives. Interconnecting devices... |
SourceID | doaj proquest gale crossref |
SourceType | Open Website Aggregation Database Enrichment Source Index Database |
StartPage | 5 |
SubjectTerms | Advertising Computational linguistics Computer industry Consent Cyber-physical systems Data collection Data entry Data exchange Data integrity Data points Information management Internet of Things Language processing lightweight encryption local differential privacy location privacy Natural language interfaces Personal information Privacy Smartphones Surveillance User behavior User experience user privacy wearable device access control web privacy protection |
SummonAdditionalLinks | – databaseName: ProQuest Central dbid: BENPR link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV1La9wwEBbt5tJL36XbJkWHQi81kbWyJeUSkjQhFBqWkoXcxFiPUijerdcJ7L_vjK3dUkhztSVjz8ujT5pvGPtojYh1basiBC0KzMBTAVo3hdIpabAqSEn1zt-u6suF-npT3WTAbZ2PVW5j4hCow9ITRn5IYZP6LAl9vPpdUNco2l3NLTQesz0MwcZM2N7p-dX8-w5lkcKgRdqRbmiG6_tD321WfWaDxuhMOcs_v6SBuf9_8Xn46Vw8Z09ztshPRvW-YI9i-5I923Zi4NkxX7HrOWGrdBKdL9Cm-BfogQ-YwFC2wKmIhJ9tGqqsBB-P-Lz7eQd-g2NwfteuObSBU306ReoRNly_ZouL8-uzyyL3Syi8krovvAhhRrCmrpVIUVhRydiEFKQvS4xjlUnGBgumqqPBxCMliBYgSS8qH0uYvWGTdtnGt4xHKSNUCRplrMLJFvMgYh_zEIMIspwyuRWZ85lMnHpa_HK4qCA5u3vkPGWfd5NWI5fGw8NPSRe7oUSEPVxYdj9c9iunSpSaCjNjolFgq6YOZdTWGxMMmIAP-USadOSu-IIectUBfiYRX7kTjUsMRbuFU7a_VbbLfrx2f63u3cO337MnEtOdEZzZZ5O-u40HmK70zYdsk38ATHju_Q priority: 102 providerName: ProQuest |
Title | Pervasive User Data Collection from Cyberspace: Privacy Concerns and Countermeasures |
URI | https://www.proquest.com/docview/2990297307 https://doaj.org/article/41ace4d388e84a95b6d1e79c88d8a8d5 |
Volume | 8 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV1La9wwEB7a9NJLk77opumiQ6GXmsha2ZJyS9JsQ6FhKVnITYz1gJbihl0nsP--M7Y3pNDHpVcjgTQazXwz1nwD8NZZmeraVUWMRhaEwHOBxjSFNjkbdDoqxfXOny_q86X-dFVd3Wv1xW_CBnrgQXCHusSQdJxZm6xGVzV1LJNxwdpo0caevZR83r1g6lv_e82SJrqBZmhGcf1hWG2uu5EFmqwyY5VfXFHP2P8nu9w7m_kePBlRojgeVvcUHqT2GexuOzCI8UI-h8sF51T5BbpYki6JD9ih6HMBfbmC4OIRcbppuKKSNngkFquvtxg2NIbmr9q1wDYKrktnCz2kC9cvYDk_uzw9L8Y-CUXQynRFkDHOOJ1pai1zkk5WKjUxRxXKkuxXZbN10aGt6mQJcOSMySFmFWQVUomzl7DT_mjTKxBJqYRVxkZbp2myI_zDrGMBU5RRlRNQW5H5MJKIcy-L756CCZaz_42cJ_D-btL1wKHx9-EnfBZ3Q5kAu_9AauFHtfD_UosJvOOT9HxNaYEBx2oD2iYTXvljCv2V5r-EEzjYHrYf7-_as5Pmrl7S7P-P1byGx4rA0JC6OYCdbnWT3hCY6ZopPLTzj1N4dHJ2sfgy7bX4J2u3-Tc |
linkProvider | Directory of Open Access Journals |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1Lb9QwELZKOcCF8lSXFvABxIWojteJbaSqKi3Llj7Uw67Um3H8QEgou2TTov1T_Y2dyWMREvTWa_yQMzOeGY_9zRDyVisW8lxnifeSJeCBx8RKWSRCxiitFp5zxDufnuXjqfh6kV2skeseC4PPKnud2ChqP3MYI99BtYl1lpjcm_9KsGoU3q72JTRasTgOy99wZFvsHh0Cf99xPvo8ORgnXVWBxAku68Qx74cY_JO5YDEwzTIeCh89d2kKuz1TUWmvrcryoMA8x2iDtjZyxzIXUjuEee-R-2IIlhyR6aMvq5gOZwrkX7fJjaCd7bhqOa-73NNgC9BD-ssANnUC_mcNGhM3ekwedb4p3W-F6QlZC-VTstHXfaCdGnhGJucYycV373QKEkwPbW1pE4FoQBIUISv0YFkgjtO68JGeVz-urFtCHxhflQtqS08RDY92oQ1SLp6T6Z3Q8QVZL2dl2CQ0cB5sFm0hlBYwWIPXhbnOnA2eeZ4OCO9JZlyXuhwraPw0cIRBOpt_0HlAPqwGzdvMHbd3_4S8WHXFtNvNh1n13XS72IgUqCb8UKmghNVZkfs0SO2U8soqD5O8R04aVA6wQGc7jAP8JqbZMvsSDjQC7yYHZLtntum0xsL8kfGXtze_IQ_Gk9MTc3J0drxFHnJwtNqw0DZZr6vL8Aocpbp43UgnJd_uejvcANIMLI4 |
linkToPdf | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtR1db9Mw0BqdhHjhG9ExwA8gXojqOE5sIyG0ras2BlWFVmlvwfEHQprS0gZQ_xq_jrvEKUKCve018VnJfd_Zd0fIC62YLwqdJ85JloAHHhIjZZUIGYI0WjjOsd7547Q4mYv3F_nFDvnV18LgtcpeJ7aK2i0s5shHqDZxzhKToxCvRczGk3fLbwlOkMKT1n6cRsciZ37zE8K39dvTMdD6JeeT4_OjkyROGEis4LJJLHMuw0SgLAQLnmmWc1-54LhNU5D8XAWlnTYqL7wCUx2C8dqYwC3LrU9NBvveILsSo6IB2T08ns4-bTM8nCmQBt21OsoyzUZ2tVk2sRM1WAb0l_4yh-3UgP_ZhtbgTe6S29FTpQcda90jO76-T-70UyBoVAoPyPkM87p4C57OgZ_p2DSGtvmItmSCYgELPdpUWNVprH9DZ6uvP4zdwBqAX9VrampHsTYerUSXslw_JPNrweQjMqgXtX9MqOfcmzyYSigtAFiDD4adz6zxjjmeDgnvUVba2Mgc52lclhDQIJ7Lf-B5SF5vgZZdH4-rlx8iLbZLsQl3-2Cx-lJGmS5FClgTLlPKK2F0XhUu9VJbpZwyysEmr5CSJaoK-EBrYsUD_CY23SoPJIQ3Ak8qh2S_J3YZdci6_MPxe1e_fk5ugiiUH06nZ0_ILQ5eV5cj2ieDZvXdPwWvqameRfak5PN1S8RvUWsyIA |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Pervasive+User+Data+Collection+from+Cyberspace%3A+Privacy+Concerns+and+Countermeasures&rft.jtitle=Cryptography&rft.au=Yinhao+Jiang&rft.au=Mir+Ali+Rezazadeh+Baee&rft.au=Leonie+Ruth+Simpson&rft.au=Praveen+Gauravaram&rft.date=2024-01-01&rft.pub=MDPI+AG&rft.eissn=2410-387X&rft.volume=8&rft.issue=1&rft.spage=5&rft_id=info:doi/10.3390%2Fcryptography8010005&rft.externalDBID=DOA&rft.externalDocID=oai_doaj_org_article_41ace4d388e84a95b6d1e79c88d8a8d5 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2410-387X&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2410-387X&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2410-387X&client=summon |