2019
DOI: 10.1109/access.2019.2894344
|View full text |Cite
|
Sign up to set email alerts
|

Emerging Privacy Issues and Solutions in Cyber-Enabled Sharing Services: From Multiple Perspectives

Abstract: Fast development of sharing services has become a crucial part of the cyber-enabled world construction process, as sharing services reinvent how people exchange and obtain goods or services. However, privacy leakage or disclosure remains as a key concern during the sharing service development process. While significant efforts have been undertaken to address various privacy issues in recent years, there is a surprising lack of review for privacy concerns in the cyber-enabled sharing world. To bridge the gap, i… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
17
0
1

Year Published

2020
2020
2025
2025

Publication Types

Select...
9

Relationship

1
8

Authors

Journals

citations
Cited by 25 publications
(18 citation statements)
references
References 136 publications
(257 reference statements)
0
17
0
1
Order By: Relevance
“…In the future, more work needs to be done in the process of moving towards Industry 4.0 [122,123]. Smart manufacturing integrates various technologies, covering robotics, CPS, IoT, big data analytics [124], and cloud computing.…”
Section: Discussionmentioning
confidence: 99%
“…In the future, more work needs to be done in the process of moving towards Industry 4.0 [122,123]. Smart manufacturing integrates various technologies, covering robotics, CPS, IoT, big data analytics [124], and cloud computing.…”
Section: Discussionmentioning
confidence: 99%
“…In the automotive industry, three main objectives can be achieved through BCT. First, business-related data could be exchanged in a reliable way [23][24][25][26][27][28][29][30][31][32][33][34][35][36][37]. Second, data produced by vehicles would be monetized by selling unused capability through ride sharing service.…”
Section: Blockchain Applications In Automotive Industrymentioning
confidence: 99%
“…However, under traditional mode, there is no appropriate mechanism for a vehicle owner to claim the vehicle condition with trustable supporting documents, whereas the new buyer has no way of easily checking and verifying the vehicle history. The vehicle-related information is completely unequal for both the owner and new buyer, which is the main barrier in the used-car transactions [3][4][5][6][7][8][9].…”
Section: Introductionmentioning
confidence: 99%
“…In summary, IncRed (InImpRed (IncRed(F) To illustrate the application and advantages of the proposed MCS identification approach, we apply the method to a highly-reliable distributed computing infrastructure developed for various computing missions for scientific experiments [29,30].…”
Section: Mcs Identificationmentioning
confidence: 99%