Pervasive User Data Collection from Cyberspace: Privacy Concerns and Countermeasures

The increasing use of technologies, particularly computing and communication paradigms, has significantly influenced our daily lives. Interconnecting devices and networks provides convenient platforms for information exchange and facilitates pervasive user data collection. This new environment prese...

Full description

Saved in:
Bibliographic Details
Published inCryptography Vol. 8; no. 1; p. 5
Main Authors Jiang, Yinhao, Rezazadeh Baee, Mir Ali, Simpson, Leonie Ruth, Gauravaram, Praveen, Pieprzyk, Josef, Zia, Tanveer, Zhao, Zhen, Le, Zung
Format Journal Article
LanguageEnglish
Published Basel MDPI AG 01.01.2024
Subjects
Online AccessGet full text

Cover

Loading…
Abstract The increasing use of technologies, particularly computing and communication paradigms, has significantly influenced our daily lives. Interconnecting devices and networks provides convenient platforms for information exchange and facilitates pervasive user data collection. This new environment presents serious privacy challenges. User activities can be continuously monitored in both digital and physical realms. Gathered data can be aggregated and analysed, revealing aspects of user behaviour that may not be apparent from a single data point. The very items that facilitate connectivity simultaneously increase the risk of privacy breaches. The data gathered to provide services can also be used for monitoring and surveillance. This paper discerns three novel categories of privacy concerns relating to pervasive user data collection: privacy and user activity in cyberspace, privacy in personal cyber–physical systems, and privacy in proactive user-driven data collection. We emphasise the primary challenges, ranging from identity tracking in browsing histories to intricate issues in opportunistic networks, situating each within practical, real-world scenarios. Furthermore, we assess the effectiveness of current countermeasures, investigating their strengths and limitations. This paper explores the challenges in preserving privacy in user interactions with dynamic interconnected systems and suggests countermeasures to mitigate identified privacy risks.
AbstractList The increasing use of technologies, particularly computing and communication paradigms, has significantly influenced our daily lives. Interconnecting devices and networks provides convenient platforms for information exchange and facilitates pervasive user data collection. This new environment presents serious privacy challenges. User activities can be continuously monitored in both digital and physical realms. Gathered data can be aggregated and analysed, revealing aspects of user behaviour that may not be apparent from a single data point. The very items that facilitate connectivity simultaneously increase the risk of privacy breaches. The data gathered to provide services can also be used for monitoring and surveillance. This paper discerns three novel categories of privacy concerns relating to pervasive user data collection: privacy and user activity in cyberspace, privacy in personal cyber–physical systems, and privacy in proactive user-driven data collection. We emphasise the primary challenges, ranging from identity tracking in browsing histories to intricate issues in opportunistic networks, situating each within practical, real-world scenarios. Furthermore, we assess the effectiveness of current countermeasures, investigating their strengths and limitations. This paper explores the challenges in preserving privacy in user interactions with dynamic interconnected systems and suggests countermeasures to mitigate identified privacy risks.
Audience Academic
Author Zhao, Zhen
Le, Zung
Simpson, Leonie Ruth
Zia, Tanveer
Jiang, Yinhao
Gauravaram, Praveen
Rezazadeh Baee, Mir Ali
Pieprzyk, Josef
Author_xml – sequence: 1
  givenname: Yinhao
  orcidid: 0000-0002-1733-9479
  surname: Jiang
  fullname: Jiang, Yinhao
– sequence: 2
  givenname: Mir Ali
  orcidid: 0000-0003-1575-7287
  surname: Rezazadeh Baee
  fullname: Rezazadeh Baee, Mir Ali
– sequence: 3
  givenname: Leonie Ruth
  surname: Simpson
  fullname: Simpson, Leonie Ruth
– sequence: 4
  givenname: Praveen
  surname: Gauravaram
  fullname: Gauravaram, Praveen
– sequence: 5
  givenname: Josef
  orcidid: 0000-0002-1917-6466
  surname: Pieprzyk
  fullname: Pieprzyk, Josef
– sequence: 6
  givenname: Tanveer
  orcidid: 0000-0003-3802-5687
  surname: Zia
  fullname: Zia, Tanveer
– sequence: 7
  givenname: Zhen
  orcidid: 0000-0003-2654-624X
  surname: Zhao
  fullname: Zhao, Zhen
– sequence: 8
  givenname: Zung
  surname: Le
  fullname: Le, Zung
BookMark eNp9kUFrGzEQhUVJoWmSX9DLQs9OpNXKknoLbpsGAs0hgd7EWBq5MuvVdrQ27L-vEpdQQik6SBre9-bBe89OhjwgYx8Ev5TS8itP8zjlDcH4czZccM7VG3badoIvpNE_Tv56v2MXpWyrouVGG21P2cM90gFKOmDzWJCazzBBs8p9j35KeWgi5V2zmtdIZQSPn5p7Sgfwc9UMHmkoDQyhfvbDhLRDKHvCcs7eRugLXvy5z9jj1y8Pq2-Lu-83t6vru4XvWj0tPA9BciFRLzsekVuuWlyHGFovBISgTDQ2WDBqiUaZLkZACxBbz5VHAfKM3R59Q4atGyntgGaXIbnnQaaNA5qS79F1oqbvgjQGTQdWrZdBoLbemGDABFW9Ph69Rsq_9lgmt817Gmp811rLW6sl11V1eVRtoJqmIeaJwNcTcJd87SWmOr_WxrSdUmJZAXkEPOVSCONLTMHdU33uH_VVyr6ifJrgqZC6LvX_ZX8D5xKoWw
CitedBy_id crossref_primary_10_3390_cryptography8030039
crossref_primary_10_1108_ITP_03_2024_0396
Cites_doi 10.1080/02564602.2017.1304834
10.1007/978-3-540-73538-0_4
10.1109/69.971193
10.1177/000271626837700157
10.1109/TDSC.2019.2927695
10.1145/3319535.3354222
10.1109/SDS.2017.7939154
10.1016/j.future.2016.06.001
10.1145/1066116.1189037
10.1145/1809842.1809864
10.1109/ICICCT.2017.7975184
10.1109/VNC.2013.6737599
10.1016/j.adhoc.2016.02.011
10.1109/TIFS.2021.3087359
10.1016/j.pmcj.2017.07.009
10.1109/SP40000.2020.00005
10.1109/ACCESS.2021.3060046
10.1145/3133956.3134086
10.1109/CTS.2012.6261095
10.1109/JSYST.2016.2550538
10.1016/j.clsr.2017.06.006
10.1186/s13638-015-0353-y
10.1109/OJVT.2022.3217552
10.1016/j.ifacol.2022.07.043
10.1109/RFID.2011.5764619
10.1137/1.9781611975482.151
10.1109/JSYST.2016.2550530
10.1145/362686.362692
10.1007/978-3-662-48116-5_22
10.1145/2213836.2213910
10.1145/3132847.3132998
10.1109/HPCC-DSS-SmartCity-DependSys57074.2022.00102
10.1007/978-3-030-26834-3_8
10.1145/2660267.2660348
10.1145/3183713.3196906
10.1109/INFOCOM.2017.8056978
10.1007/978-3-642-14527-8_1
10.1016/j.jnca.2019.06.017
10.1109/COMST.2019.2899354
10.1007/978-3-662-53008-5_5
10.1109/ACCESS.2016.2526060
10.1109/JCN.2011.6157417
10.1145/3336191.3371856
10.1109/ICC.2012.6364252
10.1080/09720529.2021.1873254
10.1109/INFOCOM.2019.8737527
10.3390/en81011883
10.46586/tosc.v2017.i1.80-105
10.1109/TENCON.2018.8650067
10.1109/INFOCOM.2014.6848002
10.1109/OSSCOM.2015.7372685
10.1109/ICME46284.2020.9102875
10.4108/eai.19-8-2015.2260862
10.46586/tosc.v2017.i1.4-44
10.1109/CVPR46437.2021.00641
10.1109/SP.2017.14
10.1007/978-3-642-31594-7_39
10.1145/1234161.1234179
10.1109/TVT.2021.3097088
10.1515/popets-2015-0006
10.1145/1460412.1460440
10.1080/01621459.1965.10480775
10.1109/SP.2018.00035
10.1016/j.pmcj.2009.04.001
10.1007/978-3-662-53887-6_18
10.1145/2976749.2978313
10.1109/TDSC.2023.3345406
10.1109/MITP.2018.2876985
10.1007/11428572_10
10.2139/ssrn.1446862
10.1109/TVT.2019.2945339
10.3390/app6030068
10.1007/11681878_14
10.1007/978-3-642-22792-9_13
10.46586/tosc.v2016.i2.52-79
10.1109/ICHI.2013.40
10.1109/EuroSP.2017.26
ContentType Journal Article
Copyright COPYRIGHT 2024 MDPI AG
2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
Copyright_xml – notice: COPYRIGHT 2024 MDPI AG
– notice: 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
DBID AAYXX
CITATION
8FE
8FG
ABUWG
AFKRA
ARAPS
AZQEC
BENPR
BGLVJ
CCPQU
DWQXO
HCIFZ
P5Z
P62
PHGZM
PHGZT
PIMPY
PKEHL
PQEST
PQGLB
PQQKQ
PQUKI
DOA
DOI 10.3390/cryptography8010005
DatabaseName CrossRef
ProQuest SciTech Collection
ProQuest Technology Collection
ProQuest Central (Alumni)
ProQuest Central UK/Ireland
Advanced Technologies & Aerospace Collection
ProQuest Central Essentials
ProQuest Central
Technology Collection
ProQuest One Community College
ProQuest Central Korea
ProQuest SciTech Premium Collection
Advanced Technologies & Aerospace Database
ProQuest Advanced Technologies & Aerospace Collection
ProQuest Central Premium
ProQuest One Academic
Publicly Available Content Database
ProQuest One Academic Middle East (New)
ProQuest One Academic Eastern Edition (DO NOT USE)
ProQuest One Applied & Life Sciences
ProQuest One Academic
ProQuest One Academic UKI Edition
DOAJ Directory of Open Access Journals
DatabaseTitle CrossRef
Publicly Available Content Database
Advanced Technologies & Aerospace Collection
Technology Collection
ProQuest One Academic Middle East (New)
ProQuest Advanced Technologies & Aerospace Collection
ProQuest Central Essentials
ProQuest One Academic Eastern Edition
ProQuest Central (Alumni Edition)
SciTech Premium Collection
ProQuest One Community College
ProQuest Technology Collection
ProQuest SciTech Collection
ProQuest Central
Advanced Technologies & Aerospace Database
ProQuest One Applied & Life Sciences
ProQuest One Academic UKI Edition
ProQuest Central Korea
ProQuest Central (New)
ProQuest One Academic
ProQuest One Academic (New)
DatabaseTitleList Publicly Available Content Database
CrossRef


Database_xml – sequence: 1
  dbid: DOA
  name: DOAJ Directory of Open Access Journals
  url: https://www.doaj.org/
  sourceTypes: Open Website
– sequence: 2
  dbid: 8FG
  name: ProQuest Technology Collection
  url: https://search.proquest.com/technologycollection1
  sourceTypes: Aggregation Database
DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
EISSN 2410-387X
ExternalDocumentID oai_doaj_org_article_41ace4d388e84a95b6d1e79c88d8a8d5
A788245516
10_3390_cryptography8010005
GeographicLocations Australia
United States
Germany
GeographicLocations_xml – name: Germany
– name: Australia
– name: United States
GroupedDBID 8FE
8FG
AADQD
AAYXX
ADBBV
AFKRA
AFZYC
ALMA_UNASSIGNED_HOLDINGS
ARAPS
BCNDV
BENPR
BGLVJ
CCPQU
CITATION
GROUPED_DOAJ
HCIFZ
IAO
ITC
MODMG
M~E
OK1
P62
PHGZM
PHGZT
PIMPY
PROAC
PMFND
ABUWG
AZQEC
DWQXO
PKEHL
PQEST
PQGLB
PQQKQ
PQUKI
PUEGO
ID FETCH-LOGICAL-c427t-c0dd3013e7640fe09052ebdfd2c11add58f89d9a856e8584ffae9aaf2c05ce1a3
IEDL.DBID DOA
ISSN 2410-387X
IngestDate Wed Aug 27 01:27:34 EDT 2025
Fri Jul 25 06:14:18 EDT 2025
Tue Jun 10 21:10:50 EDT 2025
Thu Apr 24 22:53:26 EDT 2025
Tue Jul 01 03:56:28 EDT 2025
IsDoiOpenAccess true
IsOpenAccess true
IsPeerReviewed true
IsScholarly true
Issue 1
Language English
License https://creativecommons.org/licenses/by/4.0
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c427t-c0dd3013e7640fe09052ebdfd2c11add58f89d9a856e8584ffae9aaf2c05ce1a3
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ORCID 0000-0002-1917-6466
0000-0002-1733-9479
0000-0003-3802-5687
0000-0003-2654-624X
0000-0003-1575-7287
OpenAccessLink https://doaj.org/article/41ace4d388e84a95b6d1e79c88d8a8d5
PQID 2990297307
PQPubID 2055420
ParticipantIDs doaj_primary_oai_doaj_org_article_41ace4d388e84a95b6d1e79c88d8a8d5
proquest_journals_2990297307
gale_infotracacademiconefile_A788245516
crossref_primary_10_3390_cryptography8010005
crossref_citationtrail_10_3390_cryptography8010005
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 20240101
PublicationDateYYYYMMDD 2024-01-01
PublicationDate_xml – month: 01
  year: 2024
  text: 20240101
  day: 01
PublicationDecade 2020
PublicationPlace Basel
PublicationPlace_xml – name: Basel
PublicationTitle Cryptography
PublicationYear 2024
Publisher MDPI AG
Publisher_xml – name: MDPI AG
References ref_94
Zhao (ref_18) 2022; 54
ref_93
Azam (ref_130) 2021; 9
Akalu (ref_129) 2018; 34
ref_139
Conti (ref_1) 2017; 41
ref_90
ref_14
ref_12
Abouarork (ref_104) 2021; 24
ref_131
Simpson (ref_140) 2023; 20
ref_11
ref_99
ref_10
ref_98
ref_133
ref_97
ref_96
ref_95
ref_134
ref_19
ref_17
ref_16
Irshad (ref_102) 2018; 12
ref_15
Baee (ref_141) 2023; 4
ref_126
ref_128
ref_25
ref_24
Perta (ref_13) 2015; 2015
ref_23
ref_22
ref_21
Rahman (ref_79) 2017; 72
ref_122
ref_20
ref_121
Banik (ref_92) 2019; 1
Samarati (ref_111) 2001; 13
ref_29
ref_28
ref_27
ref_26
ref_72
ref_71
ref_70
ref_78
ref_77
ref_76
ref_75
Cook (ref_143) 2009; 5
Warner (ref_46) 1965; 60
Tsai (ref_101) 2016; 44
Palaniswamy (ref_136) 2020; 25
Kim (ref_74) 2011; 13
Wu (ref_125) 2016; 10
Wang (ref_50) 2019; 18
ref_83
ref_82
ref_81
Alajeely (ref_103) 2018; 35
ref_89
ref_142
ref_88
ref_87
ref_144
ref_86
ref_85
ref_84
Avoussoukpo (ref_118) 2020; 22
Kumar (ref_127) 2019; 21
Ravidas (ref_73) 2019; 144
ref_58
ref_57
ref_56
ref_55
ref_54
ref_53
Salomatin (ref_35) 2022; 55
ref_52
ref_51
Baee (ref_116) 2021; 16
ref_59
ref_61
ref_69
ref_68
ref_67
ref_66
Soleymani (ref_132) 2015; 2015
ref_65
ref_64
Fraenkel (ref_2) 1968; 377
ref_63
Diez (ref_80) 2019; 21
ref_62
Baee (ref_138) 2021; 2021
ref_115
ref_114
ref_117
ref_119
Saxena (ref_123) 2015; 8
Wu (ref_124) 2016; 10
ref_36
ref_34
Baee (ref_135) 2019; 68
ref_33
ref_32
ref_31
ref_110
ref_30
ref_113
ref_112
Bloom (ref_47) 1970; 13
ref_39
ref_38
Kubo (ref_91) 2019; Volume 11689
ref_37
Xue (ref_60) 2022; 35
ref_106
Kuo (ref_120) 2014; 19
ref_105
ref_108
ref_109
Baee (ref_137) 2021; 70
ref_45
ref_44
ref_43
ref_100
ref_42
ref_41
ref_40
Schoeman (ref_3) 1984; 21
Hara (ref_107) 2016; 4
ref_49
ref_48
ref_9
ref_8
ref_5
ref_4
ref_7
ref_6
References_xml – volume: 35
  start-page: 369
  year: 2018
  ident: ref_103
  article-title: Routing protocols in opportunistic networks—A survey
  publication-title: IETE Tech. Rev.
  doi: 10.1080/02564602.2017.1304834
– ident: ref_110
  doi: 10.1007/978-3-540-73538-0_4
– volume: 12
  start-page: 523
  year: 2018
  ident: ref_102
  article-title: Cryptanalysis and improvement of a Multi-server Authentication protocol by Lu et al
  publication-title: KSII Trans. Internet Inf. Syst.
– volume: 13
  start-page: 1010
  year: 2001
  ident: ref_111
  article-title: Protecting respondents identities in microdata release
  publication-title: IEEE Trans. Knowl. Data Eng.
  doi: 10.1109/69.971193
– volume: 377
  start-page: 196
  year: 1968
  ident: ref_2
  article-title: ALAN F. WESTIN. Privacy and Freedom. Pp. xvi. New York: Atheneum, 1967. $10.00
  publication-title: Ann. Am. Acad. Political Soc. Sci.
  doi: 10.1177/000271626837700157
– ident: ref_68
– volume: 18
  start-page: 982
  year: 2019
  ident: ref_50
  article-title: Locally differentially private heavy hitter identification
  publication-title: IEEE Trans. Dependable Secur. Comput.
  doi: 10.1109/TDSC.2019.2927695
– ident: ref_65
– ident: ref_88
– ident: ref_39
  doi: 10.1145/3319535.3354222
– ident: ref_71
  doi: 10.1109/SDS.2017.7939154
– volume: 72
  start-page: 339
  year: 2017
  ident: ref_79
  article-title: A privacy preserving framework for RFID based healthcare systems
  publication-title: Future Gener. Comput. Syst.
  doi: 10.1016/j.future.2016.06.001
– ident: ref_112
  doi: 10.1145/1066116.1189037
– ident: ref_70
  doi: 10.1145/1809842.1809864
– ident: ref_100
  doi: 10.1109/ICICCT.2017.7975184
– ident: ref_134
  doi: 10.1109/VNC.2013.6737599
– volume: 44
  start-page: 19
  year: 2016
  ident: ref_101
  article-title: Provably secure anonymous authentication with batch verification for mobile roaming services
  publication-title: Ad Hoc Netw.
  doi: 10.1016/j.adhoc.2016.02.011
– volume: 22
  start-page: 118
  year: 2020
  ident: ref_118
  article-title: Ensuring Users Privacy and Mutual Authentication in Opportunistic Networks: A Survey
  publication-title: Int. J. Netw. Secur.
– volume: 16
  start-page: 3678
  year: 2021
  ident: ref_116
  article-title: On the Efficiency of Pairing-Based Authentication for Connected Vehicles: Time Is Not on Our Side!
  publication-title: IEEE Trans. Inf. Forensics Secur.
  doi: 10.1109/TIFS.2021.3087359
– volume: 21
  start-page: 199
  year: 1984
  ident: ref_3
  article-title: Privacy: Philosophical Dimensions
  publication-title: Am. Philos. Q.
– volume: 41
  start-page: 1
  year: 2017
  ident: ref_1
  article-title: The Internet of People (IoP): A new wave in pervasive mobile computing
  publication-title: Pervasive Mob. Comput.
  doi: 10.1016/j.pmcj.2017.07.009
– ident: ref_114
– ident: ref_4
– ident: ref_31
– ident: ref_56
– ident: ref_42
  doi: 10.1109/SP40000.2020.00005
– ident: ref_27
– volume: 9
  start-page: 31309
  year: 2021
  ident: ref_130
  article-title: A comprehensive review of authentication schemes in vehicular ad-hoc network
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2021.3060046
– ident: ref_10
– ident: ref_54
  doi: 10.1145/3133956.3134086
– ident: ref_128
– ident: ref_77
  doi: 10.1109/CTS.2012.6261095
– volume: 10
  start-page: 873
  year: 2016
  ident: ref_125
  article-title: Big data meet green challenges: Greening big data
  publication-title: IEEE Syst. J.
  doi: 10.1109/JSYST.2016.2550538
– volume: 34
  start-page: 37
  year: 2018
  ident: ref_129
  article-title: Privacy, consent and vehicular ad hoc networks (VANETs)
  publication-title: Comput. Law Secur. Rev.
  doi: 10.1016/j.clsr.2017.06.006
– volume: 25
  start-page: 100255
  year: 2020
  ident: ref_136
  article-title: Continuous authentication for VANET
  publication-title: Veh. Commun.
– ident: ref_45
– volume: 2015
  start-page: 146
  year: 2015
  ident: ref_132
  article-title: Trust management in vehicular ad hoc network: A systematic review
  publication-title: EURASIP J. Wirel. Commun. Netw.
  doi: 10.1186/s13638-015-0353-y
– ident: ref_28
– ident: ref_53
– volume: 4
  start-page: 101
  year: 2023
  ident: ref_141
  article-title: The Security of “2FLIP” Authentication Scheme for VANETs: Attacks and Rectifications
  publication-title: IEEE Open J. Veh. Technol.
  doi: 10.1109/OJVT.2022.3217552
– ident: ref_30
– ident: ref_115
– ident: ref_121
– ident: ref_11
– volume: 55
  start-page: 244
  year: 2022
  ident: ref_35
  article-title: Comparison of the Effectiveness of Countermeasures Against Tracking User Browser Fingerprints
  publication-title: IFAC-PapersOnLine
  doi: 10.1016/j.ifacol.2022.07.043
– ident: ref_67
– ident: ref_14
– ident: ref_94
  doi: 10.1109/RFID.2011.5764619
– ident: ref_59
  doi: 10.1137/1.9781611975482.151
– volume: 10
  start-page: 888
  year: 2016
  ident: ref_124
  article-title: Big data meet green challenges: Big data toward green applications
  publication-title: IEEE Syst. J.
  doi: 10.1109/JSYST.2016.2550530
– volume: 13
  start-page: 422
  year: 1970
  ident: ref_47
  article-title: Space/Time Trade-offs in Hash Coding with Allowable Errors
  publication-title: Commun. ACM
  doi: 10.1145/362686.362692
– ident: ref_95
  doi: 10.1007/978-3-662-48116-5_22
– ident: ref_17
  doi: 10.1145/2213836.2213910
– ident: ref_75
– ident: ref_25
– ident: ref_81
– ident: ref_33
– ident: ref_122
  doi: 10.1145/3132847.3132998
– volume: 2021
  start-page: 1
  year: 2021
  ident: ref_138
  article-title: Authentication strategies in vehicular communications: A taxonomy and framework
  publication-title: EURASIP J. Wirel. Commun. Netw.
– ident: ref_61
  doi: 10.1109/HPCC-DSS-SmartCity-DependSys57074.2022.00102
– volume: Volume 11689
  start-page: 129
  year: 2019
  ident: ref_91
  article-title: Tweakable TWINE: Building a Tweakable Block Cipher on Generalized Feistel Structure
  publication-title: Proceedings of the Advances in Information and Computer Security: 14th International Workshop on Security, IWSEC 2019
  doi: 10.1007/978-3-030-26834-3_8
– ident: ref_44
  doi: 10.1145/2660267.2660348
– ident: ref_52
  doi: 10.1145/3183713.3196906
– ident: ref_64
– ident: ref_36
– ident: ref_106
  doi: 10.1109/INFOCOM.2017.8056978
– ident: ref_19
– ident: ref_22
– volume: 1
  start-page: 157
  year: 2019
  ident: ref_92
  article-title: Sundae-gift
  publication-title: Submiss. Round
– ident: ref_6
  doi: 10.1007/978-3-642-14527-8_1
– volume: 144
  start-page: 79
  year: 2019
  ident: ref_73
  article-title: Access control in Internet-of-Things: A survey
  publication-title: J. Netw. Comput. Appl.
  doi: 10.1016/j.jnca.2019.06.017
– volume: 21
  start-page: 2886
  year: 2019
  ident: ref_127
  article-title: Smart grid metering networks: A survey on security, privacy and open research issues
  publication-title: IEEE Commun. Surv. Tutorials
  doi: 10.1109/COMST.2019.2899354
– ident: ref_78
– ident: ref_89
  doi: 10.1007/978-3-662-53008-5_5
– ident: ref_49
– ident: ref_32
– ident: ref_55
– ident: ref_26
– volume: 4
  start-page: 673
  year: 2016
  ident: ref_107
  article-title: Dummy-based user location anonymization under real-world constraints
  publication-title: IEEE Access
  doi: 10.1109/ACCESS.2016.2526060
– volume: 13
  start-page: 175
  year: 2011
  ident: ref_74
  article-title: Access right assignment mechanisms for secure home networks
  publication-title: J. Commun. Netw.
  doi: 10.1109/JCN.2011.6157417
– ident: ref_84
– ident: ref_66
  doi: 10.1145/3336191.3371856
– ident: ref_117
  doi: 10.1109/ICC.2012.6364252
– volume: 20
  start-page: 1799
  year: 2023
  ident: ref_140
  article-title: ALI: Anonymous Lightweight Inter-Vehicle Broadcast Authentication with Encryption
  publication-title: IEEE Trans. Dependable Secur. Comput.
– volume: 24
  start-page: 1689
  year: 2021
  ident: ref_104
  article-title: Authentication in opportunistic networks: State and art
  publication-title: J. Discret. Math. Sci. Cryptogr.
  doi: 10.1080/09720529.2021.1873254
– ident: ref_23
– ident: ref_57
  doi: 10.1109/INFOCOM.2019.8737527
– ident: ref_58
– ident: ref_98
– volume: 8
  start-page: 11883
  year: 2015
  ident: ref_123
  article-title: State of the art authentication, access control, and secure integration in smart grid
  publication-title: Energies
  doi: 10.3390/en81011883
– ident: ref_97
  doi: 10.46586/tosc.v2017.i1.80-105
– ident: ref_69
  doi: 10.1109/TENCON.2018.8650067
– ident: ref_139
– ident: ref_8
– ident: ref_113
  doi: 10.1109/INFOCOM.2014.6848002
– ident: ref_82
  doi: 10.1109/OSSCOM.2015.7372685
– ident: ref_62
  doi: 10.1109/ICME46284.2020.9102875
– ident: ref_119
  doi: 10.4108/eai.19-8-2015.2260862
– ident: ref_87
– ident: ref_90
  doi: 10.46586/tosc.v2017.i1.4-44
– ident: ref_41
– ident: ref_63
  doi: 10.1109/CVPR46437.2021.00641
– ident: ref_83
  doi: 10.1109/SP.2017.14
– ident: ref_38
– ident: ref_131
– volume: 35
  start-page: 6784
  year: 2022
  ident: ref_60
  article-title: DDRM: A continual frequency estimation mechanism with local differential privacy
  publication-title: IEEE Trans. Knowl. Data Eng.
– ident: ref_48
  doi: 10.1007/978-3-642-31594-7_39
– ident: ref_72
– ident: ref_9
  doi: 10.1145/1234161.1234179
– ident: ref_20
– ident: ref_7
– volume: 70
  start-page: 9306
  year: 2021
  ident: ref_137
  article-title: A Model to Evaluate Reliability of Authentication Protocols in C-ITS Safety-Critical Applications
  publication-title: IEEE Trans. Veh. Technol.
  doi: 10.1109/TVT.2021.3097088
– volume: 2015
  start-page: 77
  year: 2015
  ident: ref_13
  article-title: A glance through the VPN looking glass: IPv6 leakage and DNS hijacking in commercial VPN clients
  publication-title: Proc. Priv. Enhancing Technol.
  doi: 10.1515/popets-2015-0006
– ident: ref_109
  doi: 10.1145/1460412.1460440
– ident: ref_144
– volume: 60
  start-page: 63
  year: 1965
  ident: ref_46
  article-title: Randomized response: A survey technique for eliminating evasive answer bias
  publication-title: J. Am. Stat. Assoc.
  doi: 10.1080/01621459.1965.10480775
– ident: ref_51
  doi: 10.1109/SP.2018.00035
– volume: 5
  start-page: 277
  year: 2009
  ident: ref_143
  article-title: Ambient intelligence: Technologies, applications, and opportunities
  publication-title: Pervasive Mob. Comput.
  doi: 10.1016/j.pmcj.2009.04.001
– ident: ref_24
– ident: ref_34
– ident: ref_93
  doi: 10.1007/978-3-662-53887-6_18
– ident: ref_15
  doi: 10.1145/2976749.2978313
– ident: ref_142
  doi: 10.1109/TDSC.2023.3345406
– volume: 21
  start-page: 50
  year: 2019
  ident: ref_80
  article-title: Lightweight Access Control System for Wearable Devices
  publication-title: IT Prof.
  doi: 10.1109/MITP.2018.2876985
– ident: ref_40
– ident: ref_37
– volume: 19
  start-page: 18
  year: 2014
  ident: ref_120
  article-title: An efficient and secure anonymous mobility network authentication scheme
  publication-title: J. Inf. Secur. Appl.
– ident: ref_21
– ident: ref_108
  doi: 10.1007/11428572_10
– ident: ref_5
  doi: 10.2139/ssrn.1446862
– ident: ref_29
– ident: ref_85
– volume: 54
  start-page: 1
  year: 2022
  ident: ref_18
  article-title: A survey on differential privacy for unstructured data content
  publication-title: ACM Comput. Surv. (CSUR)
– volume: 68
  start-page: 11577
  year: 2019
  ident: ref_135
  article-title: Broadcast Authentication in Latency-Critical Applications: On the Efficiency of IEEE 1609.2
  publication-title: IEEE Trans. Veh. Technol.
  doi: 10.1109/TVT.2019.2945339
– ident: ref_126
  doi: 10.3390/app6030068
– ident: ref_16
  doi: 10.1007/11681878_14
– ident: ref_86
  doi: 10.1007/978-3-642-22792-9_13
– ident: ref_96
  doi: 10.46586/tosc.v2016.i2.52-79
– ident: ref_133
– ident: ref_43
– ident: ref_76
  doi: 10.1109/ICHI.2013.40
– ident: ref_105
– ident: ref_12
  doi: 10.1109/EuroSP.2017.26
– ident: ref_99
SSID ssj0002087879
Score 2.2773685
SecondaryResourceType review_article
Snippet The increasing use of technologies, particularly computing and communication paradigms, has significantly influenced our daily lives. Interconnecting devices...
SourceID doaj
proquest
gale
crossref
SourceType Open Website
Aggregation Database
Enrichment Source
Index Database
StartPage 5
SubjectTerms Advertising
Computational linguistics
Computer industry
Consent
Cyber-physical systems
Data collection
Data entry
Data exchange
Data integrity
Data points
Information management
Internet of Things
Language processing
lightweight encryption
local differential privacy
location privacy
Natural language interfaces
Personal information
Privacy
Smartphones
Surveillance
User behavior
User experience
user privacy
wearable device access control
web privacy protection
SummonAdditionalLinks – databaseName: ProQuest Central
  dbid: BENPR
  link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV1La9wwEBbt5tJL36XbJkWHQi81kbWyJeUSkjQhFBqWkoXcxFiPUijerdcJ7L_vjK3dUkhztSVjz8ujT5pvGPtojYh1basiBC0KzMBTAVo3hdIpabAqSEn1zt-u6suF-npT3WTAbZ2PVW5j4hCow9ITRn5IYZP6LAl9vPpdUNco2l3NLTQesz0MwcZM2N7p-dX8-w5lkcKgRdqRbmiG6_tD321WfWaDxuhMOcs_v6SBuf9_8Xn46Vw8Z09ztshPRvW-YI9i-5I923Zi4NkxX7HrOWGrdBKdL9Cm-BfogQ-YwFC2wKmIhJ9tGqqsBB-P-Lz7eQd-g2NwfteuObSBU306ReoRNly_ZouL8-uzyyL3Syi8krovvAhhRrCmrpVIUVhRydiEFKQvS4xjlUnGBgumqqPBxCMliBYgSS8qH0uYvWGTdtnGt4xHKSNUCRplrMLJFvMgYh_zEIMIspwyuRWZ85lMnHpa_HK4qCA5u3vkPGWfd5NWI5fGw8NPSRe7oUSEPVxYdj9c9iunSpSaCjNjolFgq6YOZdTWGxMMmIAP-USadOSu-IIectUBfiYRX7kTjUsMRbuFU7a_VbbLfrx2f63u3cO337MnEtOdEZzZZ5O-u40HmK70zYdsk38ATHju_Q
  priority: 102
  providerName: ProQuest
Title Pervasive User Data Collection from Cyberspace: Privacy Concerns and Countermeasures
URI https://www.proquest.com/docview/2990297307
https://doaj.org/article/41ace4d388e84a95b6d1e79c88d8a8d5
Volume 8
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwrV1La9wwEB7a9NJLk77opumiQ6GXmsha2ZJyS9JsQ6FhKVnITYz1gJbihl0nsP--M7Y3pNDHpVcjgTQazXwz1nwD8NZZmeraVUWMRhaEwHOBxjSFNjkbdDoqxfXOny_q86X-dFVd3Wv1xW_CBnrgQXCHusSQdJxZm6xGVzV1LJNxwdpo0caevZR83r1g6lv_e82SJrqBZmhGcf1hWG2uu5EFmqwyY5VfXFHP2P8nu9w7m_kePBlRojgeVvcUHqT2GexuOzCI8UI-h8sF51T5BbpYki6JD9ih6HMBfbmC4OIRcbppuKKSNngkFquvtxg2NIbmr9q1wDYKrktnCz2kC9cvYDk_uzw9L8Y-CUXQynRFkDHOOJ1pai1zkk5WKjUxRxXKkuxXZbN10aGt6mQJcOSMySFmFWQVUomzl7DT_mjTKxBJqYRVxkZbp2myI_zDrGMBU5RRlRNQW5H5MJKIcy-L756CCZaz_42cJ_D-btL1wKHx9-EnfBZ3Q5kAu_9AauFHtfD_UosJvOOT9HxNaYEBx2oD2iYTXvljCv2V5r-EEzjYHrYf7-_as5Pmrl7S7P-P1byGx4rA0JC6OYCdbnWT3hCY6ZopPLTzj1N4dHJ2sfgy7bX4J2u3-Tc
linkProvider Directory of Open Access Journals
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1Lb9QwELZKOcCF8lSXFvABxIWojteJbaSqKi3Llj7Uw67Um3H8QEgou2TTov1T_Y2dyWMREvTWa_yQMzOeGY_9zRDyVisW8lxnifeSJeCBx8RKWSRCxiitFp5zxDufnuXjqfh6kV2skeseC4PPKnud2ChqP3MYI99BtYl1lpjcm_9KsGoU3q72JTRasTgOy99wZFvsHh0Cf99xPvo8ORgnXVWBxAku68Qx74cY_JO5YDEwzTIeCh89d2kKuz1TUWmvrcryoMA8x2iDtjZyxzIXUjuEee-R-2IIlhyR6aMvq5gOZwrkX7fJjaCd7bhqOa-73NNgC9BD-ssANnUC_mcNGhM3ekwedb4p3W-F6QlZC-VTstHXfaCdGnhGJucYycV373QKEkwPbW1pE4FoQBIUISv0YFkgjtO68JGeVz-urFtCHxhflQtqS08RDY92oQ1SLp6T6Z3Q8QVZL2dl2CQ0cB5sFm0hlBYwWIPXhbnOnA2eeZ4OCO9JZlyXuhwraPw0cIRBOpt_0HlAPqwGzdvMHbd3_4S8WHXFtNvNh1n13XS72IgUqCb8UKmghNVZkfs0SO2U8soqD5O8R04aVA6wQGc7jAP8JqbZMvsSDjQC7yYHZLtntum0xsL8kfGXtze_IQ_Gk9MTc3J0drxFHnJwtNqw0DZZr6vL8Aocpbp43UgnJd_uejvcANIMLI4
linkToPdf http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtR1db9Mw0BqdhHjhG9ExwA8gXojqOE5sIyG0ras2BlWFVmlvwfEHQprS0gZQ_xq_jrvEKUKCve018VnJfd_Zd0fIC62YLwqdJ85JloAHHhIjZZUIGYI0WjjOsd7547Q4mYv3F_nFDvnV18LgtcpeJ7aK2i0s5shHqDZxzhKToxCvRczGk3fLbwlOkMKT1n6cRsciZ37zE8K39dvTMdD6JeeT4_OjkyROGEis4LJJLHMuw0SgLAQLnmmWc1-54LhNU5D8XAWlnTYqL7wCUx2C8dqYwC3LrU9NBvveILsSo6IB2T08ns4-bTM8nCmQBt21OsoyzUZ2tVk2sRM1WAb0l_4yh-3UgP_ZhtbgTe6S29FTpQcda90jO76-T-70UyBoVAoPyPkM87p4C57OgZ_p2DSGtvmItmSCYgELPdpUWNVprH9DZ6uvP4zdwBqAX9VrampHsTYerUSXslw_JPNrweQjMqgXtX9MqOfcmzyYSigtAFiDD4adz6zxjjmeDgnvUVba2Mgc52lclhDQIJ7Lf-B5SF5vgZZdH4-rlx8iLbZLsQl3-2Cx-lJGmS5FClgTLlPKK2F0XhUu9VJbpZwyysEmr5CSJaoK-EBrYsUD_CY23SoPJIQ3Ak8qh2S_J3YZdci6_MPxe1e_fk5ugiiUH06nZ0_ILQ5eV5cj2ieDZvXdPwWvqameRfak5PN1S8RvUWsyIA
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Pervasive+User+Data+Collection+from+Cyberspace%3A+Privacy+Concerns+and+Countermeasures&rft.jtitle=Cryptography&rft.au=Yinhao+Jiang&rft.au=Mir+Ali+Rezazadeh+Baee&rft.au=Leonie+Ruth+Simpson&rft.au=Praveen+Gauravaram&rft.date=2024-01-01&rft.pub=MDPI+AG&rft.eissn=2410-387X&rft.volume=8&rft.issue=1&rft.spage=5&rft_id=info:doi/10.3390%2Fcryptography8010005&rft.externalDBID=DOA&rft.externalDocID=oai_doaj_org_article_41ace4d388e84a95b6d1e79c88d8a8d5
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2410-387X&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2410-387X&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2410-387X&client=summon