TY - JOUR
T1 - Pervasive User Data Collection from Cyberspace
T2 - Privacy Concerns and Countermeasures
AU - Jiang, Yinhao
AU - Rezazadeh Baee, Mir Ali
AU - Simpson, Leonie Ruth
AU - Gauravaram, Praveen
AU - Pieprzyk, Josef
AU - Zia, Tanveer
AU - Zhao, Zhen
AU - Le, Zung
N1 - Publisher Copyright:
© 2024 by the authors.
PY - 2024/3
Y1 - 2024/3
N2 - The increasing use of technologies, particularly computing and communication paradigms, has significantly influenced our daily lives. Interconnecting devices and networks provides convenient platforms for information exchange and facilitates pervasive user data collection. This new environment presents serious privacy challenges. User activities can be continuously monitored in both digital and physical realms. Gathered data can be aggregated and analysed, revealing aspects of user behaviour that may not be apparent from a single data point. The very items that facilitate connectivity simultaneously increase the risk of privacy breaches. The data gathered to provide services can also be used for monitoring and surveillance. This paper discerns three novel categories of privacy concerns relating to pervasive user data collection: privacy and user activity in cyberspace, privacy in personal cyber–physical systems, and privacy in proactive user-driven data collection. We emphasise the primary challenges, ranging from identity tracking in browsing histories to intricate issues in opportunistic networks, situating each within practical, real-world scenarios. Furthermore, we assess the effectiveness of current countermeasures, investigating their strengths and limitations. This paper explores the challenges in preserving privacy in user interactions with dynamic interconnected systems and suggests countermeasures to mitigate identified privacy risks.
AB - The increasing use of technologies, particularly computing and communication paradigms, has significantly influenced our daily lives. Interconnecting devices and networks provides convenient platforms for information exchange and facilitates pervasive user data collection. This new environment presents serious privacy challenges. User activities can be continuously monitored in both digital and physical realms. Gathered data can be aggregated and analysed, revealing aspects of user behaviour that may not be apparent from a single data point. The very items that facilitate connectivity simultaneously increase the risk of privacy breaches. The data gathered to provide services can also be used for monitoring and surveillance. This paper discerns three novel categories of privacy concerns relating to pervasive user data collection: privacy and user activity in cyberspace, privacy in personal cyber–physical systems, and privacy in proactive user-driven data collection. We emphasise the primary challenges, ranging from identity tracking in browsing histories to intricate issues in opportunistic networks, situating each within practical, real-world scenarios. Furthermore, we assess the effectiveness of current countermeasures, investigating their strengths and limitations. This paper explores the challenges in preserving privacy in user interactions with dynamic interconnected systems and suggests countermeasures to mitigate identified privacy risks.
KW - lightweight encryption
KW - local differential privacy
KW - location privacy
KW - opportunistic network privacy
KW - user privacy
KW - wearable device access control
KW - web privacy protection
UR - http://www.scopus.com/inward/record.url?scp=85188701321&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85188701321&partnerID=8YFLogxK
U2 - 10.3390/cryptography8010005
DO - 10.3390/cryptography8010005
M3 - Review article
AN - SCOPUS:85188701321
SN - 2410-387X
VL - 8
JO - Cryptography
JF - Cryptography
IS - 1
M1 - 5
ER -