Futuristic invisibility for user identity and data protection

https://doi.org/10.21744/irjmis.v6n5.716

Authors

  • John Carlo Quadrando Federal University of Rio de Janeiro, Brazil
  • Cézar Teixeirao Federal University of Rio de Janeiro, Brazil
  • Lois Fronzeco Federal University of Rio de Janeiro, Brazil
  • Paulo Ezcudeiro Federal University of Rio de Janeiro, Brazil

Keywords:

money, safe, secure, society, transfer

Abstract

In this research survey analysis, we tried to introduce an all-inclusive study analyzing futuristic Invisibility of user Identity and data protection researches in cryptocurrencies. It has been classified into 2 main classes: Researches analyzing Invisibility of user Identity and Concealment, and studies proposing improvements in Invisibility of user Identity and Concealment. The first category deals with the disclosure of information through the use of de-anonymization. We inspected and determined classification for 35 types of research in this class and obtained 11 methods and 7 results from those researches. The motive of the researches is mainly to discover de-anonymization methodologies and get details which compromise Concealment, such as exploring cryptocurrency’s addresses, identifying individuality, matching cryptocurrency addresses to IP addresses, connecting cryptocurrency’s addresses to geographical-location coordinate. Our examination shows that the analytical survey of Blockchain comprises most researches in this class and there are some analytical researches.

Downloads

Download data is not yet available.

References

Abawajy, J., Huda, S., Sharmeen, S., Hassan, M. M., & Almogren, A. (2018). Identifying cyber threats to mobile-IoT applications in edge computing paradigm. Future Generation Computer Systems, 89, 525-538. https://doi.org/10.1016/j.future.2018.06.053

Amoroso, E. (2012). Cyber attacks: protecting national infrastructure. Elsevier.

Andreas Pfitzmann, S. C., Hansen, M., & Van Herreweghen, E. (2010). Privacy-Enhancing Identity Management.

Andress, J. (2014). The basics of information security: understanding the fundamentals of InfoSec in theory and practice. Syngress.

Clark, J. A., Stepney, S., & Chivers, H. (2005). Breaking the model: finalisation and a taxonomy of security attacks. Electronic Notes in Theoretical Computer Science, 137(2), 225-242. https://doi.org/10.1016/j.entcs.2005.04.033

Ebad, R. (2014). Ubiquitous computing: A brief review of impacts and issues. Scal. Comput. Pract. Exp, 2(3), 59-68.

Esmaeilian, B., Behdad, S., & Wang, B. (2016). The evolution and future of manufacturing: A review. Journal of Manufacturing Systems, 39, 79-100. https://doi.org/10.1016/j.jmsy.2016.03.001

Fang, B., Ren, K., & Jia, Y. (2018). The new frontiers of cybersecurity. Engineering, 4(1), 1-2.

Gayathri, K. S., Thomas, T., & Jayasudha, J. (2012). Security issues of media sharing in social cloud. Procedia engineering, 38, 3806-3815. https://doi.org/10.1016/j.proeng.2012.06.436

Han, J., Pei, J., & Kamber, M. (2011). Data mining: concepts and techniques. Elsevier.

Light, A. (2011). HCI as heterodoxy: Technologies of identity and the queering of interaction with computers✩. Interacting with Computers, 23(5), 430-438. https://doi.org/10.1016/j.intcom.2011.02.002

MacMillan, D. (2014). Data sharing and discovery: What librarians need to know. The Journal of Academic Librarianship, 40(5), 541-549. https://doi.org/10.1016/j.acalib.2014.06.011

Manu, T. R., Parmar, M., Shashikumara, A. A., & Asjola, V. (2019). Research Information Management Systems: A Comparative Study. In Research Data Access and Management in Modern Libraries (pp. 54-80). IGI Global. https://doi.org/10.4018/978-1-5225-8437-7.ch003

Minkkinen, M. (2015). Futures of privacy protection: a framework for creating scenarios of institutional change. Futures, 73, 48-60. https://doi.org/10.1016/j.futures.2015.07.006

Raggo, M. T. (2015). Mobile Data Loss: Threats and Countermeasures. Syngress.

Rittinghouse, J., Ransome, J. F., & CISM, C. (2004). Wireless operational security. Elsevier.

Rittinghouse, J., Ransome, J. F., & CISM, C. (2005). IM Instant Messaging Security. Elsevier.

Wasserman, R. C. (2011). Electronic medical records (EMRs), epidemiology, and epistemology: reflections on EMRs and future pediatric clinical research. Academic pediatrics, 11(4), 280-287. https://doi.org/10.1016/j.acap.2011.02.007

Zhang, G., Yang, Y., & Chen, J. (2012). A historical probability based noise generation strategy for privacy protection in cloud computing. Journal of Computer and System Sciences, 78(5), 1374-1381. https://doi.org/10.1016/j.jcss.2011.12.020

Published

2019-08-26

How to Cite

Quadrando, J. C., Teixeirao, C., Fronzeco, L., & Ezcudeiro, P. (2019). Futuristic invisibility for user identity and data protection. International Research Journal of Management, IT and Social Sciences, 6(5), 144–157. https://doi.org/10.21744/irjmis.v6n5.716

Issue

Section

Peer Review Articles