Protection of Privacy on the Web

Author(s):  
Thomas M. Chen ◽  
Zhi (Judy) Fu

Most people are concerned about online privacy but may not be aware of the various ways that their personal information is collected during routine Web browsing. We review the types of personal information that may be collected voluntarily or involuntarily through the Web browser or disclosed by a Web server. We present a taxonomy of regulatory and technological approaches to protect privacy. All approaches to date have only been partial solutions. By its nature, the Web was designed to be an open system to facilitate data sharing, and hence Web privacy continues to be a challenging problem.

Cyber Crime ◽  
2013 ◽  
pp. 83-100
Author(s):  
Thomas M. Chen ◽  
Zhi (Judy) Fu

Most people are concerned about online privacy but may not be aware of the various ways that their personal information is collected during routine Web browsing. We review the types of personal information that may be collected voluntarily or involuntarily through the Web browser or disclosed by a Web server. We present a taxonomy of regulatory and technological approaches to protect privacy. All approaches to date have only been partial solutions. By its nature, the Web was designed to be an open system to facilitate data sharing, and hence Web privacy continues to be a challenging problem.


Cyber Crime ◽  
2013 ◽  
pp. 37-51
Author(s):  
Thomas M. Chen

Most people recognize there are risks to online privacy but may not be fully aware of the various ways that personal information about them can be stolen through the Web. People can be lured to malicious Web sites designed to deceive them into revealing their personal information or unknowingly download malicious software to their computer. Even worse, legitimate sites can be compromised to host attacks called drive-by downloads. This chapter describes the online risks to identity theft and the technological means for protecting individuals from losing their personal information while surfing the Web.


2015 ◽  
Author(s):  
Pere Puigbo ◽  
Jacqueline M Major

GPT (Global Positioning Trees) is a web-server that maps phylogenetic trees on a virtual globe. The minimum requirements are a phylogenetic tree and geographical coordinates of leaves to generate a Keyhole Markup Language (KML) file that can be viewed on Google Earth. An advantage of GPT is the results may be pre-visualized directly on the web. This web-server also implements several tools to display geolocation and geotrack data. GPT has been designed to be an easy-to-use tool to track evolutionary processes and will be useful for phylogeographical and spatial epidemiological studies. It covers a wide-range of visualizations divided in three components increasingly complex: geolocation, geotrack and GPT. This web-server is freely available at http://ppuigbo.me/programs/GPT and only requires Internet access, a web browser, and an earth browser able to read KML files. Several examples and a tutorial are accessible from the web-server’s home page.


2017 ◽  
Vol 11 (2) ◽  
pp. 49-63 ◽  
Author(s):  
Harshad Suryakant Wadkar ◽  
Arun Mishra ◽  
Arati M. Dixit

In last few decades, web browser has become one of the most used computer applications. The web browser is available on many devices such as desktops, laptops, palm devices and even in cars. According to recent research reports, the browser is targeted most by exploits in attacks on both home and corporate users. The default browser security configuration may leak user's sensitive information. It may also give remote code execution facility to attacker. In this paper, a framework to detect web browser security misconfiguration is proposed. The misconfiguration leads to data sharing to third party and insecure data transfer. The system scans browser configuration and determine deviation of configuration from secure settings. In addition, the system provides facility to achieve the level of security configuration with respect to recommended settings.


2014 ◽  
Vol 971-973 ◽  
pp. 1866-1869
Author(s):  
Jin Sheng Sun ◽  
Zhi Pan Guo

With the rapid growth of the Internet, the interest for connecting devices such as frequency converters into Internet has increased. Web browser is used by remote operator to control and monitor frequency converters via Internet and this application will be widely utilized. This article makes a study of web-based monitoring for frequency converters with USS interface. It is based on TCP/IP stack and the real time operating systemμC/OS-II. Then this paper presents a detailed analysis of the Web server, and the interactive method of the browser and the Web server. In the design of the server, it emphasizes the USS protocol telegram processing method. The architecture of embedded monitoring system, hardware and software implementation are also described in this article.


2015 ◽  
Author(s):  
Pere Puigbo ◽  
Jacqueline M Major

GPT (Global Positioning Trees) is a web-server that maps phylogenetic trees on a virtual globe. The minimum requirements are a phylogenetic tree and geographical coordinates of leaves to generate a Keyhole Markup Language (KML) file that can be viewed on Google Earth. An advantage of GPT is the results may be pre-visualized directly on the web. This web-server also implements several tools to display geolocation and geotrack data. GPT has been designed to be an easy-to-use tool to track evolutionary processes and will be useful for phylogeographical and spatial epidemiological studies. It covers a wide-range of visualizations divided in three components increasingly complex: geolocation, geotrack and GPT. This web-server is freely available at http://ppuigbo.me/programs/GPT and only requires Internet access, a web browser, and an earth browser able to read KML files. Several examples and a tutorial are accessible from the web-server’s home page.


Author(s):  
Thomas M. Chen

Most people recognize there are risks to online privacy but may not be fully aware of the various ways that personal information about them can be stolen through the Web. People can be lured to malicious Web sites designed to deceive them into revealing their personal information or unknowingly download malicious software to their computer. Even worse, legitimate sites can be compromised to host attacks called drive-by downloads. This chapter describes the online risks to identity theft and the technological means for protecting individuals from losing their personal information while surfing the Web.


Electronics ◽  
2020 ◽  
Vol 9 (12) ◽  
pp. 2113
Author(s):  
Simun Yuk ◽  
Youngho Cho

The webpage steganography technique has been used for a covert communication method for various purposes in which a sender embeds a secret message into a plain webpage file like an HTML file by using various steganography methods. With human eyes, it is very difficult to distinguish between the original webpage (cover webpage) and the modified webpage with the secret data (stego webpage) because both are displayed alike in a web browser. In this approach, when two communicating entities want to share a secret message, a sender uploads a stego webpage to a web server or modifies an existing webpage in the web server by using a webpage steganography method, and then a receiver accesses the stego webpage to download and extract the embedded secret data from it. Meanwhile, according to our extensive survey, we observed that most webpage steganography methods focused on proposing or improving steganography algorithms but did not well address how to operate a stego webpage as time passes. However, if a stego webpage is used in a static way such that the stego webpage does not change and is constantly exposed to web clients until the sender removes it, such a static operation approach will limit or badly affect the hiding capacity and undetectability of a webpage steganography method. By this motivation, in this paper, we proposed a time-based dynamic operation model (TDOM) that improves the performance of existing webpage steganography methods in terms of hiding capacity and undetectability by dynamically replacing the stego webpage with other stego webpages or the original webpage. In addition, we designed two time-based dynamic operation algorithms (TDOA-C and TDOA-U), which improve the hiding capacity of existing methods and TDOA-U for improving the undetectability of existing methods, respectively. To validate our model and show the performance of our proposed algorithms, we conducted extensive comparative experiments and numerical analysis by implementing two webpage steganography methods with our TDOM (CCL with TDOA-C and COA with TDOA-C) and tested them in the web environment. According to our experiments and analysis, our proposed algorithms could significantly improve the hiding capacity and undetectability of two existing webpage steganography methods.


2020 ◽  
Vol 9 (1) ◽  
pp. 2571-2577

Data security for IOT devices is very import aspect these days as the world is moving towards digitalization. Consider a smart energy meter which provides a way to monitor the energy consumption at home, data security in such smart meter reading is very important. If the Power reading signals are tampered, then it may cause serious economic loss for the authorities. The personal information infringement of user can occur at the database and may fall in the hands of unethical persons. In order to address these issues in this paper we propose to use a permissioned blockchain network. Blockchain maintains time stamped ledger records that are very hard to tamper. Every transaction is recorded and distributed across many participant nodes, these records are immutable because they have blocks of data which are linked to each other with strong cryptographic hash. The blockchain network is built using hyperledger fabric, where all the participant nodes are registered and only registered nodes involve in consensus process of transaction. In fabric, MSP (membership service provider) identifies the identity of the participant nodes through X.509 digital certificates issued by certificate authority. Along with creation of blockchain network for the application, a mobile client, a web client, an Arduino client and web server is created. The Arduino client is the hardware module that has an energy meter (SDM120) measuring the energy consumption of the user and sends this information serially to NODEMCU. NODEMCU POSTs the read energy details to the web server at particular api, web server POSTs the details to the Blockchain Network, where transactions undergoes consensus to add this information to blockchain ledger. Now data is decentralized and every peer node has the local copy of ledger. The updated information can be queried and seen on the web Client and Mobile client user interfaces. Anonymity-enhanced blockchain has been implemented to avoid the disclosure of personal information or data. Also performance analysis of the application is carried out for number of sequential requests and concurrent requests from many users using different tools.


2016 ◽  
Vol 1 (1) ◽  
pp. 001
Author(s):  
Harry Setya Hadi

String searching is a common process in the processes that made the computer because the text is the main form of data storage. Boyer-Moore is the search string from right to left is considered the most efficient methods in practice, and matching string from the specified direction specifically an algorithm that has the best results theoretically. A system that is connected to a computer network that literally pick a web server that is accessed by multiple users in different parts of both good and bad aim. Any activity performed by the user, will be stored in Web server logs. With a log report contained in the web server can help a web server administrator to search the web request error. Web server log is a record of the activities of a web site that contains the data associated with the IP address, time of access, the page is opened, activities, and access methods. The amount of data contained in the resulting log is a log shed useful information.


Sign in / Sign up

Export Citation Format

Share Document