Security, Anonymity, and Privacy

Author(s):  
Joseph Kizza ◽  
Florence Migga Kizza

All recent social, economic, and technological advances can be attributed to the dramatic advances in availability of information and the ability to access it easily and quickly. The increasing demand for information has driven the need for easier access to it. This almost obsessive demand for information together with the abundance of it on almost any topic have created privacy and security challenges. The value of information in our information-driven economies has made it into a valuable commodity so that having it means having superior intellectual, economic, and social status. It has become a vital resource in this information age. Along with it, we have to face the security and privacy challenges it has created.

2021 ◽  
Vol 20 (2) ◽  
pp. 1-24
Author(s):  
Stef Verreydt ◽  
Koen Yskout ◽  
Wouter Joosen

Electronic consent (e-consent) has the potential to solve many paper-based consent approaches. Existing approaches, however, face challenges regarding privacy and security. This literature review aims to provide an overview of privacy and security challenges and requirements proposed by papers discussing e-consent implementations, as well as the manner in which state-of-the-art solutions address them. We conducted a systematic literature search using ACM Digital Library, IEEE Xplore, and PubMed Central. We included papers providing comprehensive discussions of one or more technical aspects of e-consent systems. Thirty-one papers met our inclusion criteria. Two distinct topics were identified, the first being discussions of e-consent representations and the second being implementations of e-consent in data sharing systems. The main challenge for e-consent representations is gathering the requirements for a “valid” consent. For the implementation papers, many provided some requirements but none provided a comprehensive overview. Blockchain is identified as a solution to transparency and trust issues in traditional client-server systems, but several challenges hinder it from being applied in practice. E-consent has the potential to grant data subjects control over their data. However, there is no agreed-upon set of security and privacy requirements that must be addressed by an e-consent platform. Therefore, security- and privacy-by-design techniques should be an essential part of the development lifecycle for such a platform.


Author(s):  
Fernando Almeida ◽  
Justino Lourenço

Internet of things (IoT) is increasingly present in our lives. As a consequence of connecting devices, IoT can make people's lives more convenient and comfortable. However, despite unquestionable benefits offered by IoT, there is still a great deal of concern from users and companies about the security and privacy of their data. In this sense, this study conducts a qualitative study based on three case studies of companies in the IoT field, which aims to characterize how these IoT companies look at the security and privacy challenges posed by IoT. The findings allowed the authors to identify the main challenges faced by IoT companies during the past years, the main privacy risks exposed by IoT devices, and the countermeasures that companies and users can adopt to increase the security of IoT.


Author(s):  
Yehia Ibrahim Alzoubi ◽  
Ahmad Al-Ahmad ◽  
Ashraf Jaradat

<span lang="EN-US">Due to the expansion growth of the IoT devices, Fog computing was proposed to enhance the low latency IoT applications and meet the distribution nature of these devices. However, Fog computing was criticized for several privacy and security vulnerabilities. This paper aims to identify and discuss the security challenges for Fog computing. It also discusses blockchain technology as a complementary mechanism associated with Fog computing to mitigate the impact of these issues. The findings of this paper reveal that blockchain can meet the privacy and security requirements of fog computing; however, there are several limitations of blockchain that should be further investigated in the context of Fog computing.</span>


Author(s):  
Imran ◽  
◽  
Syed Mubashir Ali ◽  
Muhammad Alam ◽  
Mazliham Mohd Suud ◽  
...  

It is succinct as per the topic that it will focus on IoT-based security issues. The topic is emerging so contemplation is required to bridge scanty in this field. This study will focus on a rigorous literature review which will provide us scrupulous path to satisfy the industry need. In curtail IoT is not just about interconnecting embedded devices or gadgets to the Internet, however, it is also fast and continuously growing to improve the ease or satisfaction of life. The motive of IoT services is to connect the entire globe through sensors. This study reviews the IoT methodologies in the light of qualitative research. The data analysis and synthesis focus over the last three years (2018 to 2020) which are based on the PRISMA block diagram for understanding. The review identifies the IoT privacy and security issues from a different perspective and also finds out which security issue is mostly discussed in the last few years which elaborated as a basis for further research. After a review of this paper, we can easily understand the different problem faces of IoT devices with the help of comparative analysis using summary tables and graphical representation of IoT in the context of the privacy and security challenges and issues face of IoT devices. After vigorous contemplation, it is clear that in future most of the paper will discuss data security and privacy, confidentiality, and authenticity.


2019 ◽  
Vol 8 (2) ◽  
pp. 2079-2084

Nowadays cloud computing is a driving force which has a large impact on each aspect of our lives and widely used in today's business structure. With its capacity and capability, it is widely accepted by many organizations and users. Cloud computing provides numerous benefits to end users and companies in terms of cost, maintenance, management due to which many organizations prefer to use its services with open hands. With the increasing demand, day-by-day service providers also increased and the user has a choice to choose the best one based on their demand Cloud Storage is one such service that provides cost effective storage solution to the users. They provide unlimited storage to the users based on the requirement and charge according to that only. User can rely on them for the storage but apart from the numerous benefits security and privacy remains the biggest concern whenever a user moves to cloud services. Security triad comprises of authentication, Integrity, and availability remains the concern for every user while moving towards cloud-based services. Almost everyday industry and academician working on finding an effective and efficient way, which could provide secure migration of user data in the cloud. One of the solutions could be the use of cryptographic techniques to provide data security. Cryptography is accepted largely to ensure the privacy and security of data in cloud computing. In this paper, several cryptographic technique discussed which are expected to provide the solution to the user's problem when they tend to move towards cloud computing.


2018 ◽  
Vol 7 (2.32) ◽  
pp. 341
Author(s):  
Dr E. Suresh Babu ◽  
V Bhargav Raj ◽  
M Manogna Devi ◽  
K Kirthana

This papers reviews and surveys the security issues, mechanism of internet of things (IoT) proposed in the literature. As IoT is a computing concept that describes the idea of everyday physical objects being connected to the internet and being able to identify themselves to other devices. The main advantages of IoT improve the resource utilization ratio and relationship between human and nature. In addition, it possesses various characteristics like sensing, heterogeneity, connectivity, dynamic nature and intelligence. However, it possesses several challenges like connectivity, compatibility, longevity, privacy and security. Specifically, Security and privacy are the crucial issues that need to be solved for successful deployment of IoT. Moreover, some of the data collected from the IoT are very sensitive and should not be revealed to third parties. Such data needs to be protected by some provided legislations. We reviewed some of the security challenges of IoT like secure communication, data privacy and integrity, authorizing and authenticating the devices.  


10.29007/jlq6 ◽  
2019 ◽  
Author(s):  
Thabang Mofokeng

The technology devices introduced in recent years are not only vulnerable to Internet risks but are also unable to elevate the growth of B2C e-commerce. These concerns are particularly relevant today, as the world transitions into the Fourth Industrial Revolution. To date, existing research has largely focused on obstacles to customer loyalty. Studies have tested e-commerce models guided by the establishment of trusting, satisfied and loyal consumers in various international contexts. In South Africa, however, as an emerging market, there has been limited research on the success factors of online shopping.This study examines the influence of security and privacy on trust, seen as a moderator of customer satisfaction, which in turn, has an effect on loyalty towards websites. Based on an exhaustive review of literature, a conceptual model is proposed on the relationships between security and privacy on the one hand, and customer trust, satisfaction and loyalty on the other. A total of 250 structured, self-administered questionnaires was distributed to a purposively selected sample of respondents using face-to-face surveys in Johannesburg, South Africa. A multivariate data analysis technique was used to draw inferences from the data. With an 80.1% response rate, the findings showed that privacy and security do influence customer trust; security strongly influences customer trust and weakly influences satisfaction. In South Africa, customer loyalty towards websites is strongly determined by satisfaction and weakly determined by trust. Trust significantly moderates the effect of customer satisfaction on loyalty. The study implications and limitations are presented and future research directions are suggested.


i-com ◽  
2019 ◽  
Vol 18 (3) ◽  
pp. 197-216 ◽  
Author(s):  
Verena Zimmermann ◽  
Paul Gerber ◽  
Karola Marky ◽  
Leon Böck ◽  
Florian Kirchbuchner

AbstractSmart Home technologies have the potential to increase the quality of life, home security and facilitate elderly care. Therefore, they require access to a plethora of data about the users’ homes and private lives. Resulting security and privacy concerns form a relevant barrier to adopting this promising technology. Aiming to support end users’ informed decision-making through addressing the concerns we first conducted semi-structured interviews with 42 potential and little-experienced Smart Home users. Their diverse concerns were clustered into four themes that center around attacks on Smart Home data and devices, the perceived loss of control, the trade-off between functionality and security, and user-centric concerns as compared to concerns on a societal level. Second, we discuss measures to address the four themes from an interdisciplinary perspective. The paper concludes with recommendations for addressing user concerns and for supporting developers in designing user-centered Smart Home technologies.


2021 ◽  
Vol 2 (3) ◽  
pp. 1-44
Author(s):  
Akm Iqtidar Newaz ◽  
Amit Kumar Sikder ◽  
Mohammad Ashiqur Rahman ◽  
A. Selcuk Uluagac

Recent advancements in computing systems and wireless communications have made healthcare systems more efficient than before. Modern healthcare devices can monitor and manage different health conditions of patients automatically without any manual intervention from medical professionals. Additionally, the use of implantable medical devices, body area networks, and Internet of Things technologies in healthcare systems improve the overall patient monitoring and treatment process. However, these systems are complex in software and hardware, and optimizing between security, privacy, and treatment is crucial for healthcare systems because any security or privacy violation can lead to severe effects on patients’ treatments and overall health conditions. Indeed, the healthcare domain is increasingly facing security challenges and threats due to numerous design flaws and the lack of proper security measures in healthcare devices and applications. In this article, we explore various security and privacy threats to healthcare systems and discuss the consequences of these threats. We present a detailed survey of different potential attacks and discuss their impacts. Furthermore, we review the existing security measures proposed for healthcare systems and discuss their limitations. Finally, we conclude the article with future research directions toward securing healthcare systems against common vulnerabilities.


Sign in / Sign up

Export Citation Format

Share Document