Pervasive User Data Collection from Cyberspace: Privacy Concerns and Countermeasures

Author:

Jiang Yinhao12ORCID,Rezazadeh Baee Mir Ali23ORCID,Simpson Leonie Ruth23,Gauravaram Praveen4,Pieprzyk Josef356ORCID,Zia Tanveer127ORCID,Zhao Zhen8ORCID,Le Zung12

Affiliation:

1. School of Computing, Mathematics and Engineering, Charles Sturt University, Port Macquarie, NSW 2444, Australia

2. Cyber Security Cooperative Research Centre, Joondalup, WA 6027, Australia

3. School of Computer Science, Queensland University of Technology, Brisbane, QLD 4001, Australia

4. Research & Innovation, Tata Consultancy Services Limited, North Sydney, NSW 2060, Australia

5. Data61, The Commonwealth Scientific and Industrial Research Organisation, Sydney, NSW 2000, Australia

6. Institute of Computer Science, Polish Academy of Sciences, 01-248 Warsaw, Poland

7. School of Arts and Sciences, The University of Notre Dame Australia, Sydney, NSW 2007, Australia

8. The State Key Laboratory of Integrated Service Networks, Xidian University, Xi’an 710071, China

Abstract

The increasing use of technologies, particularly computing and communication paradigms, has significantly influenced our daily lives. Interconnecting devices and networks provides convenient platforms for information exchange and facilitates pervasive user data collection. This new environment presents serious privacy challenges. User activities can be continuously monitored in both digital and physical realms. Gathered data can be aggregated and analysed, revealing aspects of user behaviour that may not be apparent from a single data point. The very items that facilitate connectivity simultaneously increase the risk of privacy breaches. The data gathered to provide services can also be used for monitoring and surveillance. This paper discerns three novel categories of privacy concerns relating to pervasive user data collection: privacy and user activity in cyberspace, privacy in personal cyber–physical systems, and privacy in proactive user-driven data collection. We emphasise the primary challenges, ranging from identity tracking in browsing histories to intricate issues in opportunistic networks, situating each within practical, real-world scenarios. Furthermore, we assess the effectiveness of current countermeasures, investigating their strengths and limitations. This paper explores the challenges in preserving privacy in user interactions with dynamic interconnected systems and suggests countermeasures to mitigate identified privacy risks.

Funder

Cyber Security Research Centre Limited

Australian Government’s Cooperative Research Centres Programme

Publisher

MDPI AG

Subject

Applied Mathematics,Computational Theory and Mathematics,Computer Networks and Communications,Computer Science Applications,Software

Reference144 articles.

1. The Internet of People (IoP): A new wave in pervasive mobile computing;Conti;Pervasive Mob. Comput.,2017

2. ALAN F. WESTIN. Privacy and Freedom. Pp. xvi. New York: Atheneum, 1967. $10.00;Fraenkel;Ann. Am. Acad. Political Soc. Sci.,1968

3. Privacy: Philosophical Dimensions;Schoeman;Am. Philos. Q.,1984

4. Zawadziński, M., and Sweeney, M. (2019). Identity in AdTech: Unravelling the ID Problem, Clearcode.

5. Soltani, A., Canty, S., Mayo, Q., Thomas, L., and Hoofnagle, C.J. (2010, January 22–24). Flash cookies and privacy. Proceedings of the 2010 AAAI Spring Symposium Series, Palo Alto, CA, USA.

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3