2020
DOI: 10.1016/j.jnca.2020.102807
|View full text |Cite
|
Sign up to set email alerts
|

Privacy enhancing technologies for solving the privacy-personalization paradox: Taxonomy and survey

Abstract: Personal data are often collected and processed in a decentralized fashion, within different contexts. For instance, with the emergence of distributed applications, several providers are usually correlating their records, and providing personalized services to their clients. Collected data include geographical and indoor positions of users, their movement patterns as well as sensor-acquired data that may reveal users' physical conditions, habits and interests. Consequently, this may lead to undesired consequen… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
53
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
3
1

Relationship

1
7

Authors

Journals

citations
Cited by 85 publications
(53 citation statements)
references
References 187 publications
(304 reference statements)
0
53
0
Order By: Relevance
“…The term Privacy Enhancing Technology (PET) covers a broad range of technologies and applications that are designed to enhance privacy and data security of both individual (e.g. Kaaniche et al 2020) and corporate users (e.g. Gan et al 2019) in their online activities and communications.…”
Section: Literature Reviewmentioning
confidence: 99%
See 1 more Smart Citation
“…The term Privacy Enhancing Technology (PET) covers a broad range of technologies and applications that are designed to enhance privacy and data security of both individual (e.g. Kaaniche et al 2020) and corporate users (e.g. Gan et al 2019) in their online activities and communications.…”
Section: Literature Reviewmentioning
confidence: 99%
“…On these premises, it is no wonder that the market of the so called 'Privacy Enhancing Technologies (PET), i.e. a wide and heterogeneous family of information and communication technologies (ICTs) designed to reduce, eliminate, or prevent unauthorized processing of users' personal data to protect their privacy and security (Heurix et al 2015;Borking and Raab 2001) such as proxy servers, virtual private networks (VPNs), end-to-end secure communications, and anonymization networks like The Onion Router (known as Tor), have recently gained momentum (Kaaniche et al 2020;Sardá et al 2019).…”
Section: Introductionmentioning
confidence: 99%
“…However, many shortcomings of user-centric PII management within TCPA have been identified over the previous years in Chapter 1.2.2 in [3]. e problem of the reunification of personal data has been well identified in the literature in Chapter IV in [4] and remains relevant.…”
Section: Introductionmentioning
confidence: 99%
“…e problem of the reunification of personal data has been well identified in the literature in Chapter IV in [4] and remains relevant. In fact, academic and industrial solutions, either they be (i) personal data stores [5][6][7][8], (ii) identity managers [9][10][11][12][13], (iii) anonymous certificate systems [3,14,15], or (iv) delegation architecture [16,17], do not address the specific needs of PII management within TCPA. Indeed, (i) personal data stores only support simple PII management scenarios where PII is collected on an "all-ornothing" basis.…”
Section: Introductionmentioning
confidence: 99%
“…The privacy and security in mobile information systems are essential because the mobile devices are equipped with several sensors that may capture sensitive data related to the user, such as location, previous communications, and other sensors data capable of identifying the different users [6,7]. Still, the privacy of the users is always crucial in the different developed systems.…”
Section: Introductionmentioning
confidence: 99%