The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, we address the issue of profiling users over the Internet using meta-data logs derived from network flow data (hence preserving a high degree of privacy). In this broader context, we specifically aim to empirically demonstrate that Internet volume and time of usage of humans do exhibit repeatable behavior over time. In our experimental study, Internet usage statistics of octets and...
Third-party libraries (3PLs) are widely introduced into Android apps and they typically request permissions for their own functionalities. Current Android systems manage permissions in process (app) granularity. Hence, the host app and the 3PLs share the same permission set. 3PL-apps may therefore introduce security risks. Separating the permission sets of the 3PLs and those of the host app are critical...
Modern electronic healthcare (e-health) systems constitute collaborative environments in which patients' private health data are shared across multiple domains. In such environments, patients' privacy can be violated through the linkability of different user access sessions over patient health data. Therefore, enforcing anonymous as well as multi-session unlinkable access for the users in e-health...
The Internet of Things(IoT) has been developing rapidly since the past decade. It is becoming a crucial part of everyday life. It is becoming a way of living in which machines perform activities on their own by communicating with each other, without the need for human beings to instruct them. In such a scenario, which concerns daily life, privacy, and secrecy should be of at most priority. Since in...
Content-Centric Networking (CCN) is a candidate next-generation Internet architecture that offers an alternative to the current IP-based model. CCN emphasizes scalable and efficient content distribution by making content explicitly named and addressable. It also offers some appealing privacy features, such as lack of source and destination addresses in packets. However, to be considered a fully viable...
In recent years, privacy issues in the networking field are getting more important. In particular, there is a lively debate about how Internet Service Providers (ISPs) should collect and treat data coming from passive network measurements. This kind of information, such as flow records or HTTP logs, carries considerable knowledge from several points of view: traffic engineering, academic research,...
Traffic classification, i.e. associating network traffic to the application that generated it, is an important tool for several tasks, spanning on different fields (security, management, traffic engineering, R&D). This process is challenged by applications that preserve Internet users' privacy by encrypting the communication content, and even more by anonymity tools, additionally hiding the source,...
This paper is an extension of my earlier paper [1]. It examines the continuing growth of this problem, and the likelihood that it will continue to get worse. Since the previous paper, the author was contacted by a lawyer involved in litigating a dispute related to TLDs. As noted in the previous paper, misdirected communication has obvious security and privacy ramifications and is an age old problem...
Online banking is a substantial service in the enlargement strategy of the modern bank sector. Nevertheless, this service has not been widely used, because of users are still scared of the risks of online transactions. Thus, the in-depth and distinct works of risks in risk awareness are an essential and meaningful assignment for the banking sector. This study investigates the role of perceived risk...
Tor is an anonymous Internet communication system based on the second generation of onion routing network protocol. Using Tor is really difficult to trace the users Internet activity: this is the reason why the usage of Tor is intended in order to protect the privacy of users, their freedom and the ability to conduct confidential communications without being monitored. Tor is even more used by cyber...
This work targets to the technologies of the Internet of Things (IoT), regarding to security and trusted devices. It provides to the readers a comprehensive understanding of both security and privacy aspects. Modern systems and networks are quoted, in order to cover any questions arising from the theoretical approach. Hardware integration devices are also presented, for flexible implementations for...
It is inevitable that the use of information and communication technologies (ICT) has been widespread in various sectors, including the governmental sectors. The implementation has brought many benefits, especially to improve performance of the public services. This is a strong reason for developing countries to encourage ICT utilizations, like Indonesia. One of the technological implementations is...
DNSSEC Look-aside Validation (DLV) is examined, highlighting its lax specifications and privacy implications. By performing extensive experiments over datasets of domain names under comprehensive experimental settings, our findings firmly confirm the privacy leakages caused by DLV. We discover that a large number of domains that should not be sent to DLV servers are being leaked. We explore the root...
There are billions of Internet of things (IoT) devices connecting to the Internet and the number is increasing. As a still ongoing technology, IoT can be used in different fields, such as agriculture, healthcare, manufacturing, energy, retailing and logistics. IoT has been changing our world and the way we live and think. However, IoT has no uniform architecture and there are different kinds of attacks...
In case that individuals feel their privacy is violated while using any recommender system, they might be willing to declare incorrect information or even completely refuse to use such services. To relieve customer concerns, privacy risks that are inherent in the utilization of such systems need to be discussed principally, and service providers should offer privacy-preservation mechanisms. Also,...
In the Intelligent Vehicle Grid, the car is becoming a formidable sensor platform, absorbing information from the environment, from other cars (and from the driver) and feeding it to other cars and infrastructure to assist in safe navigation, pollution control and traffic management. The Vehicle Grid essentially becomes an Internet of Things (IOT), which we call Internet of Vehicles (IOV), capable...
Location-aware privacy protection is a key issue in mobile applications. And the issue is more concerned in Internet of Vehicles (IoV) because of the needs for more accurate location information. Conventional location hiding methods are not suitable to be used in IoV scenario, since they blur the location information fuzzily. In this paper, the dynamic pseudonym method is used to break the link between...
The rapid development of the Internet has brought great convenience to users, but it also brought a lot of troubles to the users' information privacy exposure. This study selects the basic information of 300 users on FACEBOOK social media to cluster analysis. The data sets of users are divided into five groups by experiment, and the clustering results are classified and then discussed. By the analysis...
One's name represents one's identity, and a situational name used in an appropriate context respects one's privacy in social life. While the Internet may allow freedom to choose any screen name, social media, however, has become anchored in real-life personal relationships. Married couples in Japan have no choice but to choose one surname—mostly the husbands'—after marriage. Thus, some individuals...
People are getting more and more conscious and worried about privacy issues that arise when browsing the Web. Ad-blockers, anti-tracking extensions, privacy and anonymity plug-ins, etc. promise to protect users and their privacy from third-party tracking systems. But how effective are they? In this paper, we present the first experimental campaign aimed at benchmarking popular plug-ins for web privacy...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.