Research on context-aware architecture for personal information privacy protection

Author(s):  
Zhang Qingsheng ◽  
Qi Yong ◽  
Zhao Jizhong ◽  
Hou Di ◽  
Niu Yujie
2018 ◽  
Vol 2018 ◽  
pp. 1-14 ◽  
Author(s):  
Qi Gao ◽  
Junwei Zhang ◽  
Jianfeng Ma ◽  
Chao Yang ◽  
Jingjing Guo ◽  
...  

With the fast development of Logistics Internet of Things and smart devices, the security of express information processed by mobile devices in Logistics Internet of Things has attracted much attention. However, the existing secure express schemes only focus on privacy protection of personal information but do not consider the security of the logistics information against couriers with malicious mobile devices. For example, a privacy-preserving delivery path should be required in order to prevent the privacy leakage in the express delivery procedure. Therefore, besides the security of personal information, the privacy protection of logistics information and authentication of mobile devices used in express company are important to security in Logistics Internet of Things. In this paper, we propose a secure logistics information scheme LIP-PA to provide privacy protection of both personal information and logistics information. First, we define the basic requirements of Logistics Internet of Things. Then, using attribute-based encryption and position-based key exchange, we propose a logistics information privacy protection scheme with position and attribute-based access control for mobile devices. The analysis results show that our scheme satisfies the defined requirements. Finally, the performance of our scheme is evaluated and the experiment results show that our scheme is efficient and feasible for mobile devices in real parcel delivery scenario.


Author(s):  
E. Vance Wilson ◽  
David D. Dobrzykowski ◽  
Joseph A. Cazier

People claim to be concerned about information privacy on the Internet, yet they frequently give out personal information to online vendors and correspondents with whom they have little, if any, prior experience. This behavior is known as the privacy paradox and is particularly relevant to the context of e-health, due to the special risks of health information exposure. Using data from the 2005 Health Information National Trends Survey (HINTS), this study addresses a key question regarding online health information privacy: Do individuals self-police risky e-health activities (i.e., uses where personal information is given out) or are they indifferent to risk based upon generalized trust in broadcast media and the Internet as sources for health information? In exploring this question, our study contrasts several alternative models of health trust, and recommends a new partial-mediation model for future studies. The results show that Internet trust mediates most effects of broadcast media trust on Internet use and that Internet trust plays a much smaller role in motivating Internet uses that are risky than is the case for low-risk uses. These results have important implications for researchers, policymakers, and healthcare administrators in determining the level of privacy protection individuals need in their use of e-health applications.


2014 ◽  
Vol 51 (4) ◽  
pp. 523-533 ◽  
Author(s):  
Young Min Baek ◽  
Young Bae ◽  
Irkwon Jeong ◽  
Eunmee Kim ◽  
June Woong Rhee

2017 ◽  
Vol 25 (1) ◽  
pp. 62-79 ◽  
Author(s):  
Nikolaos Polatidis ◽  
Christos K. Georgiadis ◽  
Elias Pimenidis ◽  
Emmanouil Stiakakis

Purpose This paper aims to address privacy concerns that arise from the use of mobile recommender systems when processing contextual information relating to the user. Mobile recommender systems aim to solve the information overload problem by recommending products or services to users of Web services on mobile devices, such as smartphones or tablets, at any given point in time and in any possible location. They use recommendation methods, such as collaborative filtering or content-based filtering and use a considerable amount of contextual information to provide relevant recommendations. However, because of privacy concerns, users are not willing to provide the required personal information that would allow their views to be recorded and make these systems usable. Design/methodology/approach This work is focused on user privacy by providing a method for context privacy-preservation and privacy protection at user interface level. Thus, a set of algorithms that are part of the method has been designed with privacy protection in mind, which is done by using realistic dummy parameter creation. To demonstrate the applicability of the method, a relevant context-aware data set has been used to run performance and usability tests. Findings The proposed method has been experimentally evaluated using performance and usability evaluation tests and is shown that with a small decrease in terms of performance, user privacy can be protected. Originality/value This is a novel research paper that proposed a method for protecting the privacy of mobile recommender systems users when context parameters are used.


Cyber Crime ◽  
2013 ◽  
pp. 1177-1192
Author(s):  
E. Vance Wilson ◽  
David D. Dobrzykowski ◽  
Joseph A. Cazier

People claim to be concerned about information privacy on the Internet, yet they frequently give out personal information to online vendors and correspondents with whom they have little, if any, prior experience. This behavior is known as the privacy paradox and is particularly relevant to the context of e-health, due to the special risks of health information exposure. Using data from the 2005 Health Information National Trends Survey (HINTS), this study addresses a key question regarding online health information privacy: Do individuals self-police risky e-health activities (i.e., uses where personal information is given out) or are they indifferent to risk based upon generalized trust in broadcast media and the Internet as sources for health information? In exploring this question, our study contrasts several alternative models of health trust, and recommends a new partial-mediation model for future studies. The results show that Internet trust mediates most effects of broadcast media trust on Internet use and that Internet trust plays a much smaller role in motivating Internet uses that are risky than is the case for low-risk uses. These results have important implications for researchers, policymakers, and healthcare administrators in determining the level of privacy protection individuals need in their use of e-health applications.


2018 ◽  
Vol 19 (2) ◽  
pp. 253-267 ◽  
Author(s):  
Fa-Chang Cheng ◽  
Yu Shan Wang

Serious concerns about the invasion of digital footprint information privacy due to intense commercial promotion through data mining has led to the emergence of privacy by design in the form of the Do Not Track (DNT) mechanism. This paper attempts to construct a theory to justify and find an appropriate solution to balance the different interests by implementing the DNT mechanism in the real-world marketing industry. The research method involves deduction in legal reasoning. This paper argues that digital footprint information privacy, which has high commercial value, should at least be awarded the status of a semi-fundamental human right. Additionally, when to adopt a DNT opt-out or default mechanism depends on the type of personal information involved. The practical implications suggest a compromise between digital footprint privacy protection and commercial applications in the marketing industry, to be achieved through technology. Since this important topic is relatively new in the area of marketing applications and no primary academic research has established a complete theoretical legal foundation, this article is among the first to do so. Beside its originality, this article also contributes to the literature by proposing a theoretically practical mechanism for both digital footprint privacy protection and marketing profits.


Mathematics ◽  
2020 ◽  
Vol 8 (7) ◽  
pp. 1048
Author(s):  
Fa-Chang Cheng ◽  
Su-Man Wang

The newly added requirement in Taiwan’s Money Laundering Control Act to fully authenticate customers’ identity by regulated entities, particularly to reveal substantial beneficial owners, entails greater disclosure of customers’ private information. How to strike the balance between such disclosure and information privacy protection has not been mentioned yet in Taiwan. The goal of this research paper is to identify support measures, consisting of criteria, sub-criteria, and alternatives, for information privacy protection for future change. A questionnaire was developed through applying the modified Delphi method. This study also applied the analytic hierarchy process to the questionnaire to prioritize the importance of different criteria and sub-criteria and find the optimal alternative. The search results indicated that the criteria were (in order of importance) internal control in financial institutions, prior surveillance mechanisms, informed consent, and safe-harbor immunity. Further examination of the details for the sub-criteria indicated that the establishment of an external independent supervising mechanism and the adoption of a personal information impact assessment are increasingly prioritized for implementation. Moreover, Alternative 2 (“Public and private entities should implement criteria and sub-criteria simultaneously”) weighed 0.62 more in terms of importance compared with Alternative 1 (“Public entities should implement criteria and sub-criteria first”), which weighed 0.38.


Sign in / Sign up

Export Citation Format

Share Document