2020
DOI: 10.3390/electronics9091519
|View full text |Cite
|
Sign up to set email alerts
|

PRIPRO—Privacy Profiles: User Profiling Management for Smart Environments

Abstract: Smart environments are pervasive computing systems that provide higher comfort levels on daily routines throughout interactions among smart sensors and embedded computers. The lack of privacy within these interactions can lead to the exposure of sensitive data. We present PRIPRO (PRIvacy PROfiles), a management tool that includes an Android application that acts on the user’s smartphone by allowing or blocking resources according to the context, in order to address this issue. Back-end web server processes and… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
11
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
4
3
2

Relationship

1
8

Authors

Journals

citations
Cited by 18 publications
(11 citation statements)
references
References 48 publications
0
11
0
Order By: Relevance
“…Most related works propose preemptive access control [29] and authentication schemes [30] for data mashup privacy preservation in fog computing environments. However, the utility of the published data is lesser in such approaches because they are limited by design to expose publicly available data only.…”
Section: Discussionmentioning
confidence: 99%
See 1 more Smart Citation
“…Most related works propose preemptive access control [29] and authentication schemes [30] for data mashup privacy preservation in fog computing environments. However, the utility of the published data is lesser in such approaches because they are limited by design to expose publicly available data only.…”
Section: Discussionmentioning
confidence: 99%
“…Most works on privacy preservation in distributed data environments propose a preemptive approach, defining who has access to private data attributes and resources by defining user profiles [29]. Access control techniques and authentication-based schemes [30] explicitly grant and revoke data access to parties.…”
Section: Related Workmentioning
confidence: 99%
“…In the context of time series, there are various scenarios and applications that demand data management and communications between different devices, users and data in general. There are several solutions that address data management based on privacy [14] and information security rules [15], including decentralized implementation [16], smart environments [17,18], disruptive technologies [19], and vulnerability prediction [20].…”
Section: Time Series Forecastingmentioning
confidence: 99%
“…As presented in works [13,30,31], a taxonomy allows the systematic organization of relevant data in the form of a hierarchy. The keywords and concepts used to define a taxonomy establish parameters throughout the information production cycle, in which distributed professionals can participate in the knowledge creation process in an organized way.…”
Section: Taxonomymentioning
confidence: 99%