scholarly journals Impact of User Data Privacy Management Controls on Mobile Device Investigations

Author(s):  
Panagiotis Andriotis ◽  
Theo Tryfonas
2015 ◽  
pp. 426-458 ◽  
Author(s):  
S. R. Murugaiyan ◽  
D. Chandramohan ◽  
T. Vengattaraman ◽  
P. Dhavachelvan

The present focuses on the Cloud storage services are having a critical issue in handling the user's private information and its confidentiality. The User data privacy preserving is a vital facet of online storage in cloud computing. The information in cloud data storage is underneath, staid molests of baffling addict endeavor, and it may leads to user clandestine in a roar privacy breach. Moreover, privacy preservation is an indeed research pasture in contemporary information technology development. Preserving User Data in Cloud Service (PUDCS) happens due to the data privacy breach results to a rhythmic way of intruding high confidential digital storage area and barter those information into business by embezzle others information. This paper focuses on preventing (hush-hush) digital data using the proposed privacy preserving framework. It also describes the prevention of stored data and de-identifying unauthorized user attempts, log monitoring and maintaining it in the cloud for promoting allusion to providers and users.


Internet of Things (IoT) would touch upon almost all aspects of everyday life, as a consequence of which, everything (i.e. living and non-living things) will have a counterpart virtual identities on the internet which would be readable, addressable and locatable. Although it would empower its users with 24×7 connectivity around the global world, unknowingly they would also provide it permission to peep into user’s personal world, which can generate a huge risk on the usability of IoT by users. Thus analyzing the framework of IOT from the perspective of user data protection is a very crucial self-test which is required for IoT implementation. Often the term security and privacy are used interchangeably, but in the IoT environment, both these concept would play a crucial but differentiating role. In this paper, we have scanned the IoT environment with the perspective of privacy requirements, possible threats and the mitigating solutions which are currently in use.


2019 ◽  
Vol 292 ◽  
pp. 03002
Author(s):  
Albert Espinal ◽  
Rebeca Estrada ◽  
Carlos Monsalve

Nowadays, the traffic over the networks is changing because of new protocols, devices and applications. Therefore, it is necessary to analyze the impact over services and resources. Traffic Classification of network is a very important prerequisite for tasks such as traffic engineering and provisioning quality of service. In this paper, we analyze the variable packet size of the traffic in an university campus network through the collected data using a novel sniffer that ensures the user data privacy. We separate the collected data by type of traffic, protocols and applications. Finally, we estimate the traffic model that represents this traffic by means of a Poisson process and compute its associated numerical parameters.


Author(s):  
A Vijaya Kumar ◽  

The billions of users all over the world are spending online social network, such as Twitter, Facebook, Tumbler and LinkedIn. The flaws in this social media may indications to abuse user’s information and execute an attack of identity cloning. In this work mainly focuses, a new method for hiding data to hide precise details in profile pictures to learn botnets and fake profiles. In this paper, presents an ordering and investigation of recognition mechanisms of genetic copy attacks on online network of social, purely established on attribute likeness, friend network likeness, and profile inquiry for a time interval and record of Internet Protocol sequences. This work, proposals an algorithm for transform discrete wavelet for hiding the data. So, the system can prevent the replica attacks and offer the whole user data privacy protective. Similarly, when users upload the profile image or photos it would be first watermarked and then updated. Java static watermarking systems and algorithms is been used for watermarking procedure. Here tracking any fake users updating the same profile picture given easier and tracking their IP address also became easier. Also, our system raises certain features which can be investigated to the users through process of registration. Thus, providing secure authentication. Hence avoiding clone attacks in social media became easier.


Author(s):  
Kianoosh G. Boroojeni ◽  
M. Hadi Amini ◽  
S. S. Iyengar

Computer ◽  
2018 ◽  
Vol 51 (8) ◽  
pp. 56-59 ◽  
Author(s):  
Jim Isaak ◽  
Mina J. Hanna

Sign in / Sign up

Export Citation Format

Share Document